Search Results - (( java application optimisation algorithm ) OR ( mere classification based algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    On the exploration and exploitation in popular swarm-based metaheuristic algorithms by Hussain, Kashif, Mohd Salleh, Mohd Najib, Cheng, Shi, Shi, Yuhui

    Published 2018
    “…Among such algorithms are swarm-based methods like particle swarm optimization and ant colony optimization which are increasingly attracting new researchers. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali by M. Ali, Musab A.

    Published 2016
    “…At any process of recognition stage, the biometric data is protected and also whenever there is a compromise to any information in the database it will be on the cancelable biometric template merely without affecting the original biometric information. …”
    Get full text
    Get full text
    Thesis