Search Results - (( parallel extraction utilizing algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Online harmonic extraction and synchronization algorithm based control for unified power quality conditioner for microgrid systems by Hasan, K., Othman, M.M., Meraj, S.T., Rahman, N.F.A., Noor, S.Z.M., Musirin, I., Abidin, I.Z.

    Published 2022
    “…This manuscript proposes an Adaptive Linear Neural Network (ADALINE) based control for the unified power quality conditioner to protect the critical loads from voltage related power quality problems and mitigate the current related power quality problems produced by nonlinear loads. Due to parallel computing feature and simple algorithm, ADALINE is utilized widely in parameter estimation. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9
  10. 10

    An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title by Khalaf, Emad Taha

    Published 2019
    “…The enhanced method combines three transformation methods for analyzing the iris image and extracting its local features. It uses a weighted K-means clustering algorithm based on the improved FA to optimize the initial clustering centers of K-means algorithm, known as Weighted K-means clustering-Improved Firefly Algorithm (WKIFA). …”
    Get full text
    Get full text
    Thesis
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12

    EMG motion pattern classification through design and optimization of neural network by Ahsan, Md. Rezwanul, Ibrahimy, Muhammad Ibn, Khalifa, Othman Omran

    Published 2012
    “…A back-propagation neural network with Levenberg-Marquardt training algorithm has been utilized for the classification of EMG signals. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  13. 13
  14. 14

    A new multi-frames watermarking technique for tamper detection and recovery by Khor, Hui Liang

    Published 2017
    “…The proposed multi-frames watermarking scheme was developed by utilizing multicores technology where medical images have been divided among cores and perform watermarking process in parallel. …”
    Get full text
    Get full text
    Thesis
  15. 15

    A novel neuroscience-inspired architecture: for computer vision applications by Hassan, Marwa Yousif, Khalifa, Othman Omran, Abu Talib, Azhar, Olanrewaju, Rashidah Funke, Hassan Abdalla Hashim, Aisha

    Published 2016
    “…The theory behind deep learning, the human visual system was investigated and general principles of how it functions are extracted. Our finding is that there are neuroscience theories that are not utilized in deep learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  16. 16

    Design and implementation of multimedia digital matrix system by Chui, Yew Leong, Ramli, Abdul Rahman, Perumal, Thinagaran, Sulaiman, Mohd Yusof, Ali, Mohd Liakot

    Published 2005
    “…Due to the issues of signal integrity in high-speed digital design, a new adaptive channel synchronization algorithm has been developed. The algorithm, named as hybrid-reset algorithm utilizes the nature of asynchronous reset to compensate the drawback of synchronous counter for phase detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Constant lock circuit for DC micro-grid system by Mohammed, Asaad Abduljabbar

    Published 2017
    “…Furthermore, it is deemed relevant to give priority to the renewable energy production for supplying load extracting maximum power from the REs. Moreover, it is also necessary to provide an adequate load demand regardless the power generation amount for satisfying an easy connection between two parallel sources for sharing power. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Electromygraphy (EMG) signal based hand gesture recognition using Artificial Neural Network (ANN) by Ahsan, Md. Rezwanul, Ibrahimy, Muhammad Ibn, Khalifa, Othman Omran

    Published 2011
    “…The EMG pattern signatures are extracted from the signals for each movement and then ANN utilized to classify the EMG signals based on features. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Suppression of total harmonic distortion using single-phase shunt active power filter with fuzzy logic controller by Usman, Hamisu

    Published 2013
    “…In the simulation, synchronous reference frame was used to extract the harmonic reference current produced by the non-linear loads. …”
    Get full text
    Get full text
    Thesis
  20. 20

    WiFi-based human activity recognition through wall using deep learning by Wong, Yan Chiew, Ahmed Abuhoureyah, Fahd Saad, Mohd Isira, Ahmad Sadhiqin

    Published 2023
    “…An RPi 4 B is attached to an ALFA AWUS 1900 adapter utilizing Nexmon firmware monitors and extracts CSI data with flexible C-based firmware for Broadcom/ Cypress WiFi chips. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article