Search Results - (( java implementation mining algorithm ) OR ( parallel identification based algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models. by Kwad, Ayad Mahmood

    Published 2022
    “…Best Hammerstein parallel NN polynomial based model and series-parallel NN polynomial model are 88.75% and 93.9% respectively, for best Hammerstein parallel NN sigmoid based model and series-parallel NN sigmoid based model 78.26% and 95.95% respectively, and for best Hammerstein parallel NN hyperbolic tangent based model and series-parallel NN hyperbolic tangent based model 70.7% and 96.4% respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi by Hayawi, Mustafa Jabbar

    Published 2015
    “…A parallel manipulator is a closed loop mechanism which consists of a moving platform that is connected to a fixed base by at least two kinematic chains in parallel. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Tile-Level Parallelism For H.264/Avc Codec Using Parallel Domain Decomposition Algorithm On Shared Memory Architecture by Eessa, Mohammed F.

    Published 2015
    “…The theme of this thesis is based on the utilisation of features of the parallel model in the design phase of an algorithm in order to reduce the computational complexity in comparison with the serial algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A comparison study between integrated OBFARX-NN and OBF-NN for modeling of nonlinear systems in extended regions of operation by Zabiri, H., Ariff, M., Tufa, L.D., Ramasamy, M.

    Published 2014
    “…A residuals-based sequential identification algorithm using parallel integration of linear Orthornormal basis filters-Auto regressive with exogenous input (OBFARX) and a nonlinear neural network (NN) models is developed. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Wavelet network based online sequential extreme learning machine for dynamic system modeling by Mohammed Salih, Dhiadeen, Mohd Noor, Samsul Bahari, Marhaban, Mohammad Hamiruce, Raja Ahmad, Raja Mohd Kamil

    Published 2013
    “…Wavelet network (WN) has been introduced in many applications of dynamic systems modeling with different learning algorithms. In this paper an online sequential extreme learning machine (OSELM) algorithm adopted as training procedure for wavelet network based on serial-parallel nonlinear autoregressive exogenous (NARX) model. …”
    Get full text
    Conference or Workshop Item
  14. 14

    Integrated OBF-NN models for extrapolation enhancement in conventional neural networks for nonlinear systems by H., Zabiri, M., Ramasamy, Lemma D, Tufa, Maulud, Abdulhalim

    Published 2011
    “…A residuals-based sequential identification algorithm using parallel integration of linear Orthornormal basis filters (OBF) and a nonlinear feedforward (MLP) NN model is used and applied to the nonlinear Van de Vusse reactor. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Collaborative adaptive filtering approach for the identification of complex-valued improper signals by Cyprian, Amadi Chukwuemena, Che Ujang, Che Ahmad Bukhari, Sali, Aduwati, Hashim, Fazirulhisyam

    Published 2019
    “…This paper proposes a novel hybrid filter for data-adaptive optimal identification and modeling of complex-valued real-world signals based on the convex combination approach. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Fpga-Based Accelerator For The Identification Of Finger Vein Pattern Via K-Nearest Centroid Neighbors by Yew , Tze Ee

    Published 2016
    “…In conclusion, the finger vein identification hardware architecture based on KNCN classifier is successfully implemented on an FPGA board with faster processing time as compared with software-based implementation of KNCN classifier in MATLAB.…”
    Get full text
    Get full text
    Thesis
  18. 18

    OPTIMIZATION OF HYBRID-FUZZY CONTROLLER FOR SERVOMOTOR CONTROL USING A MODIFIED GENETIC ALGORITHM by WAHYUNGGORO, OYAS WAHYUNGGORO

    Published 2011
    “…In this thesis, a new optimization GA-based algorithm that emanates from modification of conventional GA to reduce the iterations number and the duration time, namely, semi-parallel operation genetic algorithm (SPOGA) is proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Integrated OBF-NN models with enhanced extrapolation capability for nonlinear systems by H., Zabiri, M., Ramasamy, T. D. , Lemma, Maulud, Abdulhalim

    Published 2013
    “…For this purpose, a residuals-based identification algorithm using parallel integration of linear orthonormal basis filters (OBF) and neural networks model is developed and analyzed under range extrapolations. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal
  20. 20

    Improved TLBO-JAYA Algorithm for Subset Feature Selection and Parameter Optimisation in Intrusion Detection System by Aljanabi, Mohammad, Mohd Arfian, Ismail, Mezhuyev, Vitaliy

    Published 2020
    “…Many optimisation-based intrusion detection algorithms have been developed and are widely used for intrusion identification. …”
    Get full text
    Get full text
    Get full text
    Article