Search Results - (( java implementation mining algorithm ) OR ( programming line effect algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Novel techniques for voltage stability assessment and improvement in power system / Ismail Musirin. by Musirin, Ismail

    Published 2004
    “…Few automatic contingency analysis and ranking algorithms due to line and generator outages were separately developed. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Differential equation fault location algorithm with harmonic effects in power system by Izatti, Md Amin, Mohd Rafi, Adzman, Haziah, Abdul Hamid, Muhd Hafizi, Idris, Melaty, Amirruddin, Omar, Aliman

    Published 2023
    “…In this study, several filters were tested to obtain the lowest fault location error to reduce the effect of harmonic components on the developed fault location algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Three-term conjugate gradient method under Armijo line search for unemployment rate in Malaysia / Muhammad Fiqhi Zulkifli by Zulkifli, Muhammad Fiqhi

    Published 2023
    “…TTDY is the most effective method based on numerical results but only TTRMIL+ can be applied in regression analysis.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid intelligent active force controller for robot arms using evolutionary neural networks by Hussein, S. B., Jamaluddin, H., Mailah, M., Zalzala, A. M. S.

    Published 2000
    “…In the first stage, which is performed off-line, the proposed EC algorithm is employed to evolve a pool of ANN structures until they converge to an optimum structure. …”
    Get full text
    Get full text
    Article
  14. 14

    Optimal Reactive Power Dispatch for Voltage Stability Improvement Considering Line Contingencies using PSO by Nor Rul Hasma, Abdullah, I., Musirin

    Published 2013
    “…This paper presents a swarm intelligence algorithm for monitoring and improving voltage stability in power system considering a contingency conditions; line outage. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    A hybrid intelligent active force controller for robot arms using evolutionary neural networks by Hussein, S.B, Jamaluddin, H, Mailah, M, Zalzala, A.M.S

    Published 2000
    “…In the first stage, which is performed off-line, the proposed EC algorithm is employed to evolve a pool of ANN structures until they converge to an optimum structure. …”
    Get full text
    Get full text
    Article
  16. 16

    Optimized electric power distribution via genetic algorithm based estimation / Otonye Ene Ojuka ... [et al.] by Ojuka, Otonye Ene, Wokoma, Biobele Alexander, Bala, Tekena Kashmony, Kinba, Queen Blue-Jack, Tamunobelema, Asime

    Published 2024
    “…This research shows an effective way of minimizing power loss in distribution lines using optimal capacitor placement (OCP) in conjunction with a genetic algorithm (GA). …”
    Get full text
    Get full text
    Article
  17. 17

    Identification of maximum loadability in power system with line outages using chaotic mutation immune evolutionary programming / Sharifah Azma Syed Mustaffa, Ismail Musirin and Muh... by Syed Mustaff, Sharifah Azma, Musirin, Ismail, Othman, Muhammad Murtadha

    Published 2018
    “…This paper proposes a new algorithm namely Chaotic Mutation Immune Evolutionary Programming (CMIEP) for maximum loadability under N-1 contingency in a transmission system. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Multi-objective evolutionary programming for static var compensator (SVC) in power system considering contingencies (N-m) by Nor Rul Hasma, Abdullah, Mahaletchumi, Morgan, Mahfuzah, Mustafa, Rosdiyana, Samad, Pebrianti, Dwi

    Published 2017
    “…This device is capable of minimizing the overall system losses and concurrently improves the voltage stability. A line index, namely SVSI becomes indicator for the placement of SVC and the parameters of SVCs are tuned by using the multi-objective evolutionary programming technique, effectively able to control the power. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
    Get full text
    Get full text
    Thesis