Search Results - (( java implication based algorithm ) OR ( technology validation mining algorithm ))

Refine Results
  1. 1

    Energy efficiency of the bitcoin mining hardware and related blockchain technology by Noor Faiqah Izzati, Afandi

    Published 2018
    “…MATLAB is used in developing and validation the algorithm. Dataset was selected from open sources and applied in the proposed formula to evaluate and predict energy efficiency of bitcoin mining hardware. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  2. 2
  3. 3

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Setting up a new Radiology Center Technology for improvement : Data mining (Image Mining Technique) by Zubir, Nazira

    Published 2016
    “…In setting up a new Radiology Centre, the data mining technology specifically image mining is addressed. …”
    Get full text
    Get full text
    Monograph
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Data Classification and Its Application in Credit Card Approval by Thai , VinhTuan

    Published 2004
    “…Sample credit card approval dataset is used to demonstrate the functionality of a data mining solution prototype, which includes the typical tasks of a decision tree induction process: data selection, data preprocessing, decision tree induction, tree pruning, rules generation and validation. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12

    Improving intrusion detection using genetic algorithm by Hashemi, V. Moraveji, Muda, Zaiton, Yassin, Warusia

    Published 2013
    “…To overcome this problem, a genetic algorithm approach is proposed. Genetic Algorithm (GA) is most frequently employed as a robust technology based on machine learning for designing IDS. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20