Search Results - (( java data connection algorithm ) OR ( program validation mining algorithm ))
Search alternatives:
- connection algorithm »
- program validation »
- validation mining »
- mining algorithm »
- data connection »
- java »
-
1
Case Slicing Technique for Feature Selection
Published 2004“…Finding a good classification algorithm is an important component of many data mining projects. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Predicting students’ STEM academic performance in Malaysian secondary schools using educational data mining
Published 2023“…Four different data mining classification algorithms which are Random Forest, PART, J48 and Naive Bayes will be used on the dataset. …”
Get full text
Get full text
Thesis -
5
Face recognition using eigenfaces and smooth support vector machine
Published 2011“…Support Vector Machine (SVM) is a new algorithm of data mining technique, recently received increasing popularity in machine learning community. …”
Get full text
Get full text
Thesis -
6
Face recognition using eigenfaces and smooth support vector machine
Published 2011“…Support Vector Machine (SVM) is a new algorithm of data mining technique, recently received increasing popularity in machine learning community. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Development Of Machine Learning User Interface For Pump Diagnostics
Published 2022“…Build up a user interface by using Visual Studio Code (VSC) to run the coding of Cascading Style Sheet (CSS), Hyper Text Markup Language (HTML) and JavaScript (JS) as a webpage and connect to Azure Machine Learning Model and this will allow the user from using the model from a webpage when they have active internet with any devices.…”
Get full text
Get full text
Monograph -
8
Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan
Published 2013“…Using 10-fold cross validation for each algorithm, it was found that decision tree was the best algorithm with 83.6944% correctness. …”
Get full text
Get full text
Conference or Workshop Item -
9
A Data Mining-Based Model for Assessing Guangzhou's Higher Vocational Colleges 'New Energy Automobile Majors' Vocational Skills
Published 2024“…The approach employs algorithms for data mining to enhance the accuracy and accessibility of results through the use of Random Forest (RF) and Generalized Additive Models (GAM) in a layering architecture. …”
Get full text
Get full text
Get full text
Article -
10
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…This merit is provided by balancing the exploitation of solution structure and exploration of its appropriate weighting factors through use of a robust and efficient optimization algorithm in learning process of GEP approach. To assess the applicability and accuracy of the proposed method for long-term electrical energy consumption, its estimates are compared with those obtained from artificial neural network (ANN), support vector regression (SVR), adaptive neuro-fuzzy inference system (ANFIS), rule-based data mining algorithm, GEP, linear, quadratic and exponential models optimized by particle swarm optimization (PSO), cuckoo search algorithm (CSA), artificial cooperative search (ACS) algorithm and backtracking search algorithm (BSA). …”
Get full text
Get full text
Get full text
Thesis -
11
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…The offline scheme utilizes a Time-based One-Time Password (TOTP) algorithm to allow users to authenticate to the vehicle without needing an Internet connection once they have registered online when Internet access is available. …”
Get full text
Get full text
Thesis -
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
13
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
14
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
15
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…In realizing this concept, we consider the advantages of data passing between two web services which each are connected with one or multiple set of clusters. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Dynamic and adaptive execution models for data stream mining applications in mobile edge cloud computing systems / Muhammad Habib Ur Rehman
Published 2016“…The validation and verification of the proposed architecture were performed using High-Level Petri Nets (HLPN) and Z3 Solver. …”
Get full text
Get full text
Get full text
Thesis -
17
Network monopoly / Tan Kean Yeap
Published 2002“…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
Get full text
Get full text
Thesis -
18
A Preemptive behaviour-based malware detection through analysis of API calls sequence inspired by Human Immune System
Published 2024journal::journal article -
19
Validation of deep convolutional neural network for age estimation in children using mandibular premolars on digital panoramic dental imaging / Norhasmira Mohammad
Published 2022“…Overall, deep learning using the Tensorflow.Keras (tf.keras) application programming interface (API) makes the development of the DCNN model easier. …”
Get full text
Get full text
Thesis -
20
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis
