Search Results - (( java application mining algorithm ) OR ( basic operation machine algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Development of cell formation algorithm and model for cellular manufacturing system by Nouri, Hossein

    Published 2011
    “…These issues consist of workload balancing among cells and operation issues such as machines assignment, inter/intra-cells material handling, workers assignment,subcontracting based on operational time, operation sequence of the parts and assessing effects of these parameters on cell design in dynamic environment. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Application Of Multi-Layer Perceptron Technique To Detect And Locate The Base Of A Young Corn Plant by Morshidi, Malik Arman

    Published 2007
    “…Results of studying color segmentation using machine-learning algorithm and color space analysis is presented in this thesis. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancement of network security by use machine learning by Hasan, Ahmed Raheem

    Published 2019
    “…By the end of the research, graphs and animation system have done shown to demonstrate the basic operation of the enhance network with machine learning system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Automatic generic process migration system in linux by Zarrabi, Amirreza

    Published 2012
    “…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A new modern scheme for solving fractal–fractional differential equations based on deep feedforward neural network with multiple hidden layer by Admon, Mohd Rashid, Senu, Norazak, Ahmadian, Ali, Majid, Zanariah Abdul, Salahshour, Soheil

    Published 2024
    “…During the initial stage of the method development, the basic framework on solving FFDEs is designed. To minimize the burden of computational time, the vectorized algorithm is constructed at the next stage for method to be performed efficiently. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Empirical study on intelligent android malware detection based on supervised machine learning by Abdullah, Talal A.A., Ali, Waleed, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2020
    “…More significantly, this paper empirically discusses and compares the performances of six supervised machine learning algorithms, known as K-Nearest Neighbors (K-NN), Decision Tree (DT), Support Vector Machine (SVM), Random Forest (RF), Naïve Bayes (NB), and Logistic Regression (LR), which are commonly used in the literature for detecting malware apps.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Text-based emotion prediction system using machine learning approach by Ahmad Fakhri, Ab. Nasir, Eng, Seok Nee, Chun, Sern Choong, Ahmad Shahrizan, Abdul Ghani, Anwar, P. P. Abdul Majeed, Asrul, Adam, Mhd, Furqan

    Published 2020
    “…Therefore, four supervised machine learning classification algorithms such as Multinomial Naïve Bayes, Support Vector Machine, Decision Trees, and kNearest Neighbors were investigated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Bundle Sorting Mobile Application by Zulkifley, Muhammad Dzofir Hafiz

    Published 2020
    “…It has been introduced by manufacturing that operated in Germany. This innovation of IT development changes from the manufacturing process that involved machine to digital automated production in the production line. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Review of deep convolution neural network in image classification by Al-Saffar, Ahmed Ali Mohammed, Tao, Hai, Mohammed, Ahmed Talab

    Published 2017
    “…This paper first introduces the rise and development of deep learning and convolution neural network, and summarizes the basic model structure, convolution feature extraction and pooling operation of convolution neural network. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Machining characteristics of hastelloy c-2000 in end milling using artificial intelligence approach by Nurul Hidayah, Razak

    Published 2012
    “…This research work deals with the machining characteristics of Hastelloy C-2000 in the end milling operations. …”
    Get full text
    Get full text
    Thesis