Search Results - (( outside evaluation method algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    An efficient anomaly intrusion detection method with feature selection and evolutionary neural network by Sarvari, Samira, Mohd Sani, Nor Fazlida, Mohd Hanapi, Zurina, Abdullah @ Selimun, Mohd Taufik

    Published 2020
    “…Moreover, the value of the solution is evaluated based on the objective function and the Fuzzy C Means (FCM) clustering method used to provide the best results for the overlapping dataset and create the fuzzy membership search domain which includes all possible compromise solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Interpolation and extrapolation techniques based Neural Network in estimating the missing ionospheric TEC data by Jayapal V., Zain A.F.M.

    Published 2024
    “…Normalized RMSE, RMSE and relative correction are computed for both methods to evaluate the capability of NN to interpolate and extrapolate the missing data. …”
    Conference Paper
  11. 11

    A novel method for vegetation encroachment monitoring of transmission lines using a single 2D camera by Ahmad, Junaid, Malik, Aamir Saeed, Abdullah, Mohd Faris, Kamel, Nidal S., Xia, Likun

    Published 2015
    “…excess vegetation encroachments within and outside ROWs. The performance evaluation of a real time developed test-bed scenario proves the feasibilities of integrating the method for transmission line maintenance.…”
    Get full text
    Get full text
    Article
  12. 12

    Industrial datasets with ICS testbed and attack detection using machine learning techniques by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md Rafiqul, Balla, Asaad, Tahir, Mohammad, Elsheikh, Elfatih A A, Suliman, F M

    Published 2021
    “…The performance metrics such as accuracy, precision, recall, F1 score are evaluated and cross validated for different ML algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    State-of-charge estimation for lithium-ion batteries with optimized self-supervised transformer deep learning model by Dickson Neoh Tze How, Dr.

    Published 2023
    “…The evaluation is carried out based on multiple electric vehicles (EV) drive cycles with different Li-ion cells chemistry at varying ambient temperatures. …”
    text::Thesis