Search Results - (( java application mining algorithm ) OR ( source estimation learning algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Hybrid FFT-ADALINE algorithm with fast estimation of harmonics in power system by Goh, Zai Peng, Mohd Radzi, Mohd Amran, Thien, Yee Von, Hizam, Hashim, Abdul Wahab, Noor Izzri

    Published 2016
    “…Hybrid fast Fourier transform Adaptive LINear Element (FFT-ADALINE) algorithm for fast and accurate estimation of harmonics is proposed in this study. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Effective source number enumeration approach under small snapshot numbers by Ge, Shengguo

    Published 2024
    “…This study also makes a significant contribution to data science by providing a comprehensive method for estimating the number of signal sources, which is integrated with a machine learning model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Linear Discriminate Analysis And K-Nearest Neighbor Based Diagnostic Analytic Of Harmonic Source Identification by Jopri, Mohd Hatta, Abdullah, Abdul Rahim, Manap, Mustafa, Nor Shah, Mohd Badril, Sutikno, Tole, Too, Jing Wei

    Published 2021
    “…This paper presents a comparison of machine learning (ML) algorithm known as linear discriminate analysis (LDA) and k-nearest neighbor (KNN) in identifying and diagnosing the harmonic sources. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Visual Crowd Counting System Using Deep Learning by Mohd Wafi Nazrul Adam, Mohd Ridhwan Oxley Adam

    Published 2021
    “…The back-end will be using a neural network model based on the Single-Image Crowd Counting via Multi-Column Convolutional Neural Network (Zhang, et al., 2016) and is developed through the PyTorch framework, an open-source machine learning library. The model will be trained using the Mall Dataset and the Adam optimization algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15

    State-of-charge estimation for lithium-ion batteries with optimized self-supervised transformer deep learning model by Dickson Neoh Tze How, Dr.

    Published 2023
    “…To overcome these limitations, this study proposes a novel DL architecture for SOC estimation using the Transformer model with the self-supervised learning (SSL) framework. …”
    text::Thesis
  16. 16

    Estimating Forest Aboveground Biomass Density Using Remote Sensing and Machine Learning : A RSME Approach by Yaniza Shaira, Zakaria, Mohd Fadzil, Akhir, Aidy, M Muslim, Nur Afiqah, Ariffin, Azizul, Ahmad

    Published 2025
    “…An accurate estimation of aboveground biomass (AGB) density is essential for effective forest management, carbon stock monitoring, and informed land management decisions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Real-Time Flood Inundation Map Generation Using Decision Tree Machine Learning Method: Case Study of Kelantan River Basins by Sidek L.M., Basri H., Marufuzzaman M., Deros A.M., Osman S., Hassan F.A.

    Published 2024
    “…To forecast unexpected flood occurrences, faster flood prediction necessitates computational prediction models such as Machine Learning (ML) algorithms, which are extensively utilized around the world. …”
    Book chapter
  18. 18

    Development of a modified adaptive protection scheme using machine learning technique for fault classification in renewable energy penetrated transmission line by Olufemi, Osaji Emmanuel

    Published 2020
    “…The hybrid Wavelet Multiresolution Analysis and Machine learning algorithm (WMRA-ML) is used to extracts the useful hidden knowledge from decomposed one-cycle fault transient signals (voltage & current) from four Matlab/Simulink CIGRE models. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Artificial neural network (ANN) as post-processing stage for chemically selective field effect transistor (CHEMFET) sensor selectivity based-on ion concentration / Nurhakimah Abd A... by Abd Aziz, Nurhakimah

    Published 2016
    “…Other than developing supervised learning, this study also was focusing on exploration of unsupervised learning mainly in blind source separation (BSS) algorithm to separate the interface signal. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A detailed description on unsupervised heterogeneous anomaly based intrusion detection framework by Udzir, Nur Izura, Hajamydeen, Asif Iqbal

    Published 2019
    “…More effort has been taken in utilizing the data mining and machine learning algorithms to construct anomaly based intrusion detection systems, but the dependency on the learned models that were built based on earlier network behaviour still exists, which restricts those methods in detecting new or unknown intrusions. …”
    Get full text
    Get full text
    Get full text
    Article