Search Results - (( java application modified algorithm ) OR ( using simulation mining algorithm ))

Refine Results
  1. 1

    Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting by Othman, Mohammad Lutfi, Aris, Ishak, Abdul Wahab, Noor Izzri

    Published 2014
    “…This is justified by the practicality and necessity of divulging the decision algorithm hidden in the recorded relay event report using computational intelligence-based data mining. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    A partition based feature selection approach for mixed data clustering / Ashish Dutt by Ashish , Dutt

    Published 2020
    “…One such pre-processing algorithm in EDM is clustering. It is a widely used method in data mining to discover unique patterns in underlying data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5
  6. 6

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Finding objects with segmentation strategy based multi robot exploration in unknown environment by Arezoumand, Reza, Mashohor, Syamsiah, Marhaban, Mohammad Hamiruce

    Published 2013
    “…Also the algorithm using segmentation strategy is using frontier base algorithm for exploring divided area. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance by Tan, Su Sze

    Published 2019
    “…Data mining is the sixth step in which software of Orange is used as the tool. …”
    Get full text
    Get full text
    Monograph
  9. 9
  10. 10
  11. 11

    Logic mining method via hybrid discrete hopfield neural network by Guo, Yueling, Mohd Kasihmuddin, Mohd Shareduwan, Zamri, Nur Ezlin, Li, Jia, Romli, Nurul Atiqah, Mansor, Mohd Asyraf, Ruzai, Wan Nur Aqlili

    Published 2025
    “…To demonstrate the efficacy of the proposed logic mining approach, experiments were conducted using both simulated and real-world datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18
  19. 19

    Distribution and health risk assessment of trace metals in freshwater tilapia from three different aquaculture sites in Jelebu Region (Malaysia) by Low, K.H., Zain, S.M., Abas, R., Salleh, K.M., Teo, Y.Y.

    Published 2015
    “…Results were compared with established legal limits and the daily ingestion exposures simulated using the Monte Carlo algorithm for potential health risks. …”
    Get full text
    Article
  20. 20