Search Results - (( java application mining algorithm ) OR ( using factor issues algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Sentiment analysis regarding marital issues using Naive Bayes algorithm / Farah Nabila Mohd Razali by Mohd Razali, Farah Nabila

    Published 2025
    “…This study explores the application of sentiment analysis using the Naive Bayes algorithm to understand public perceptions of marital issues, particularly factors contributing to the rising divorce rate. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Automated multi-factor analytics for cheat-proofing attendance-taking by Tachmammedov, S., Hooi, Y.K., Kalid, K.S.

    Published 2018
    “…The third factor checks attendance time using server time. The fourth factor is geo-location of the student. …”
    Get full text
    Get full text
    Article
  11. 11

    Factors influencing graphical user algorithm for mobile banking user authentication: a systematic literature review by Ugochukwu, Ejike Ekeke Kingsley, Jusoh, Yusmadi Yah

    Published 2014
    “…With the increasing number of mobile users, which currently is estimated to be about 500million users by 2015 according to a study done by the Yankee Group in 2011, the main objective of this study is to review studies on mobile banking usability factors and graphical user authentication algorithms on the suitable algorithm to be adopted for mobile banking user authentication. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    PREDICTIVE ANALYTICS FOR EQUIPMENT FAILURE BY USING GATED RECURRENT UNIT – GENETIC ALGORITHM (GRU – GA) by ZAINUDDIN, ZAHIRAH

    Published 2023
    “…Gated Recurrent Unit (GRU) algorithm is used to cater the predicting action of equipment state based on data from an oil and gas industry.…”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    QR factorization equalisation scheme for mode devision multiplexing transmission in fibre optics by Abbas, Sharafal-Deen Abdulkadhum

    Published 2016
    “…The algorithm mentioned in the study reduces the computational complexity problem which is one of the main issues that accompany currently used tap filter algorithms, such as (LMS) and (RLS). …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Temporal integration based factorization to improve prediction accuracy of collaborative filtering by Al-Qasem, Al-Hadi Ismail Ahmed

    Published 2016
    “…The existing temporal-based factorization approaches used the long-term preferences and the short-term preferences. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Mutable Composite Firefly Algorithm for Microarray-Based Cancer Classification by Fajila, Fathima, Yusof, Yuhanis

    Published 2024
    “…The proposed algorithm, named the CFS-Mutable Composite Firefly Algorithm (CFS-MCFA), is evaluated based on two metrics, namely classification accuracy and genes subset size, using a Support Vector Machine (SVM) classifier. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Variable Global Optimization min-sum (VGOMS) algorithm of decodeand-forward protocol for the relay node in the cooperative channel by Hushairi, Zen, Jamaah, Suut, Al-Khalid, Bin Hj Othman, Khairuddin, Bin Ab Hamid

    Published 2019
    “…In this study, a straightforward Particle Swarm Optimization approach was used to determine the optimal scaling factor to obtain optimized error corrective performance of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Variable Global Optimization min-sum (VGOMS) algorithm of decode-and forward-protocol for the relay node in the cooperative channel by Hushairi, Zen, Al-Khalid, Hj Othman, Khairuddin, Abdul Hamid, Jamaah, Suut

    Published 2020
    “…In this study, a straightforward Particle Swarm Optimization approach was used to determine the optimal scaling factor to obtain optimized error corrective performance of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Article