Search Results - (( java implementation mining algorithm ) OR ( using vector drops algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Machine learning methods for herschel-bulkley fluids in annulus: Pressure drop predictions and algorithm performance evaluation by Kumar, A., Ridha, S., Ganet, T., Vasant, P., Ilyas, S.U.

    Published 2020
    “…The impact of each input parameter affecting the pressure drop is quantified using the RF algorithm. © 2020 by the authors.…”
    Get full text
    Get full text
    Article
  8. 8

    Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants by M, Irfan, N, Lukman, A. A, Alfauzi, J, Jumadi

    Published 2019
    “…In this study comparing the performance classification techniques of Support Vector Machine (SVM) and C4.5 algorithms. The attributes used consist of Leaves, Stems, and Fruits. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Investigation of throughput and packet drop for Hata model on VANET using NCTUns simulation software for open area and suburban area / Rosmawani Samsudin by Samsudin, Rosmawani

    Published 2012
    “…The investigation was done from 5 to up 20 V ANET nodes. The algorithms considered are Ad-hoc On-demand Distance Vector (AODV) protocol. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Artificial intelligent power prediction for efficient resource management of WCDMA mobile network by Tee Y.K., Tinng S.K., Koh J., David Y.

    Published 2023
    “…This artificial intelligent call admission control (CAC) was validated using a dynamic WCDMA mobile network simulator. A few comparative results in downlink have shown that our integrated support vector regression assists genetic algorithm (SVRaGA) is capable of predicting next interval power consumption at Node B with low prediction error and improving the quality of service (QoS) by reducing dropped calls. � 2008 IEICE.…”
    Conference Paper
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Hybrid artificial intelligent algorithm for call admission control in WCDMA mobile network by Tee Y.K., Tiong S.K., Johnny K.S.P., Yeoh E.C.

    Published 2023
    “…The proposed algorithm, support vector regression assists genetic algorithm (SVRaGA) was tested in a dynamic WCDMA mobile network simulator. …”
    Conference paper
  13. 13

    A new countermeasure to combat the embedding-based attacks on the goldreich-goldwasser-halevi lattice-based cryptosystem by Arif Mandangan, Nazreen Syazwina Nazaruddin, Muhammad Asyraf Asbullah, Hailiza Kamarulhaili, Che Haziqah Che Hussin, Babarinsa Olayiwola

    Published 2024
    “…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A new countermeasure to combat the embedding-based attacks on the Goldreich-Goldwasser-Halevi lattice-based cryptosystem by Mandangan, Arif, Nazaruddin, Nazreen Syazwina, Asbullah, Muhammad Asyraf, Kamarulhaili, Hailiza, Che Hussin, Che Haziqah, Olayiwola, Babarinsa

    Published 2024
    “…Consequently, the simplified CVP can be reduced to a Shortest-Vector Problem (SVP) variant which can be solved by using lattice-reduction algorithms such as the LLL algorithm in a shorter amount of time. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    AntNet: a robust routing algorithm for data networks by Haseeb, Shariq, Sidek, Khairul Azami, Ismail, Ahmad Faris, Weng Kin, Lai, Yit Mei, Aw

    Published 2004
    “…The performance matrix used to compare the algorithms is based on average throughput, packet loss, packet drop and end-to-end delay. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    An empirical study of pattern leakage impact during data preprocessing on machine learning-based intrusion detection models reliability by Bouke, Mohamed Aly, Abdullah, Azizol

    Published 2023
    “…Additionally, we find that some algorithms are more sensitive to data leakage than others, as seen by the drop in model accuracy when built without leakage. …”
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Machine learning algorithms for early predicting dropout student online learning by Dewi, Meta Amalya, Kurniadi, Felix Indra, Murad, Dina Fitria, Rabiha, Sucianna Ghadati, Awanis, Romli

    Published 2023
    “…Of the 4 algorithms used, the highest recall value is in Naive Bayes (1), the highest precision is in Logistic Regression with Lasso (1), while the highest accuracy value (0.99) and F1score (0.97) are obtained from the Support Vector Machine which has value equal to Logistic Regression with Lasso. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    A study on the application of discrete curvature feature extraction and optimization algorithms to battery health estimation by Goh, Hui Hwang, An, Zhen, Zhang, Dongdong, Dai, Wei, Kurniawan, Tonni Agustiono, Goh, Kai Chen

    Published 2024
    “…This study employs two optimization algorithms, namely, particle swarm optimization (PSO) and sparrow optimization algorithm (SSA), in conjunction with least squares support vector machine (LSSVM) to compare the model against three conventional models, namely, Gaussian process regression (GPR), convolutional neural networks (CNN), and long short-term memory (LSTM). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Minimization of torque ripple and flux droop using optimal DTC switching and sector rotation strategy by Ahmad Tarusan, Siti Azura

    Published 2022
    “…A five-level cascaded H-bridge (CHB) inverter was used in the optimal DTC switching strategy because it had many voltage vectors and could be used for a variety of speed operations. …”
    Get full text
    Get full text
    Get full text
    Thesis