Search Results - (( java application mining algorithm ) OR ( changes evaluation window algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…The idea of the algorithm was based on creating different contention window ranges between access point and wireless workstations, and changing the technique of increasing the contention window value when the collision happened. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…The algorithm development combines the frameworks from Phases 1 to 3, evaluating real and synthetic datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Efficient back-off mechanism for multimedia support in IEEE 802.11E by Al-Nuaimi, Aws Ali Shakir

    Published 2012
    “…The performance evaluations are conducted by using NS-2 simulator. The simulation results demonstrate that the proposed algorithm has greatly outperformed the previous mechanisms such as the non-linear dynamic adaptation scheme of the minimum contention window (CWmin HA), dynamic adaptation algorithm of the maximum contention window (CWmax adaptation), Adaptive Enhanced Distributed Coordination Function (AEDCF), Random adaptive MAC parameters scheme RAMPS and the conventional EDCA mechanism. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11

    A New Pre-Processing Technique For Computational Of Stereo Matching Algorithm by Kadmin, Ahmad Fauzan, Hamzah, Rostam Affendi, Abd Manap, Nurulfajar, Hamid, Mohd Saad

    Published 2021
    “…Based on Middlebury Standard Benchmarking Dataset, the proposed algorithm has 23.35% accuracy for nonocc error and 31.65% accuracy for all error, which yields a better accuracy compared to some works in the evaluation dataset.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    High performance through wall human activity recognition using WiFi by Wong, Yan Chiew, Abuhoureyah, Fahd, Mohd Isira, Ahmad Sadhiqin, Chuah, Joon Huang

    Published 2023
    “…We also implemented a CSI-based model using Nexmon with an LSTM algorithm with commodity WiFi devices and evaluated it in several environments. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…As a comparative study, the performance of the algorithms was evaluated based on various standard metrics. …”
    Get full text
    Get full text
    Thesis
  14. 14

    An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach by Khan, T., Singh, K., Shariq, M., Ahmad, K., Savita, K.S., Ahmadian, A., Salahshour, S., Conti, M.

    Published 2023
    “…Simulation experiments exhibit the effectiveness of the proposed trust evaluation method in terms of change in trust values, malicious nodes detection (94), FNR (0.9), F1-Score (0.6), and accuracy (92) in the presence of 50 malicious nodes. …”
    Get full text
    Get full text
    Article
  15. 15

    A hybrid rate control mechanism for forwarding and congestion control in named data network by Alsamman, Mohammed Gamal

    Published 2020
    “…Therefore, transport algorithms which use conventional paradigms would not work correctly in the NDN environment, since the content source location frequently changes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Relationship between deforestation and land surface temperature across an elevation gradient using satellite imagery in Cameron Highlands, Malaysia by How, Darren Jin Aik

    Published 2021
    “…The specific objectives were three folds; (i) to detect Land Use and Land Cover Change (LULCC) between 2009 and 2019 in Cameron Highlands, (ii) to evaluate the relationship between Land Use and Land Cover Change (LULCC) and Land Surface Temperature (LST) using Landsat and MODIS imageries, and (iii) to assess Land Use and Land Cover Changes (LULCC) of different forest types across an altitude gradient. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Ensemble learning using multi-objective optimisation for arabic handwritten words by Ghadhban, Haitham Qutaiba

    Published 2021
    “…Multi-Objective Ensemble Oriented (MOEO) formulated to control the classifier topology and provide feedback support for changing the classifiers' topology and weights based on the extension of Non-dominated Sorting Genetic Algorithm (NSGA-II). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development of a Production Planning and Control Software in Total Productivity Maintenance Environment by Lee, Pang Seng

    Published 2004
    “…A TPM based software program has been developed to ease the process of production planning and control in TPM environment by executing sequential methodology such as problem identification, literature review, problem formulation, data coliection, company operation review, flow chart system and program algorithm before test run in the company. This program has been created in Window format and encoded using Microsoft Visual Basic 6.0. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Adaptive linux-based TCP congestion control algorithm for high-speed networks by Alrshah, Mohamed A.

    Published 2017
    “…Moreover, the AF-based CCA shows lower sensitivity to the change of buffer size and packet error rate, which increases its efficiency. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Adaptive multi-parent crossover GA for feature optimization in epileptic seizure identification by Al-Sharhan, Salah, Bimba, Andrew

    Published 2019
    “…The proposed approach in this work tends to tackle the multiple EEG channels problem by segmenting the EEG signals in the frequency domain based on changing spikes rather than the traditional time based windowing approach. …”
    Get full text
    Get full text
    Article