Search Results - (( java application during algorithm ) OR ( parameter evaluation mining algorithm ))
Search alternatives:
- parameter evaluation »
- application during »
- evaluation mining »
- java application »
- during algorithm »
- mining algorithm »
-
1
Tree-based contrast subspace mining method
Published 2020“…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
2
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…After evaluating the results of these algorithms, a hybrid Artificial Neural Network-based Imperial Competitive Algorithm (ANN-ICA) was presented in the deployment step of the proposed methodology to identify the structural damage of illustrative structures. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
5
A hybrid model using genetic algorithm and neural network for predicting dengue outbreak
Published 2012Get full text
Get full text
Conference or Workshop Item -
6
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
7
Hybrid tabu search – strawberry algorithm for multidimensional knapsack problem
Published 2022“…Next, the solution was enhanced by using the hybrid TS-SBA. The parameters setting to run the hybrid TS-SBA was determined by using a combination of Factorial Design of Experiments and Decision Tree Data Mining methods. …”
Get full text
Get full text
Get full text
Thesis -
8
Improvement on rooftop classification of worldview-3 imagery using object-based image analysis
Published 2019“…Then, the classifier (support vector machine (SVM) and data mining (DM) algorithm, decision tree (DT) were applied on each fusion image and their accuracy were evaluated. …”
Get full text
Get full text
Thesis -
9
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…The clusters are generated from the clustering graphs. To evaluate the performance, BOCEDS algorithm is executed on two syntactic and one practical data streams. …”
Get full text
Get full text
Thesis -
10
Mining The Basic Reproduction Number (R0) Forecast For The Covid Outbreak
Published 2022“…Therefore, this study aims to identify and evaluate the attributes and parameters associated with the development of the Basic Reproduction Number, R0 models, classify the data used in existing Basic Reproduction Number R0 models, develop a predictive classification model for the Basic Reproduction Number, R0 and to assess and enhance the accuracy of the Basic Reproduction Number, R0 prediction. …”
Get full text
Get full text
Monograph -
11
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…For the proposed technique of the FID3-DBD algorithm, the continuous and discrete (integer) attributes would be defined in the linguistic values of the fuzzy sets, and the FUZZYDBD method is being used to set up the fuzzy sets’ parameters. …”
Get full text
Get full text
Thesis -
12
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Modelling of optimized hybrid debris flow using airborne laser scanning data in Malaysia
Published 2019“…Cuckoo search), and evaluator or model inducing algorithms (e.g SVM) were utilized for feature subset selection, which further compared to select the optimal conditioning factors subset. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
17
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
18
Machine-learning-based adaptive distance protection relay to eliminate zone-3 protection under-reach problem on statcom-compensated transmission lines
Published 2020“…This current study proposes an intelligent data mining approach for the Machine Learning- Adaptive Distance Relay (ML-ADR) fault classification model using novel extracted 1-cycle transient voltage and current signals hidden knowledge from both healthy and faulty lines parameters. …”
Get full text
Get full text
Thesis -
19
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
