Search Results - (( parameter detection mining algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Experimenting the dendrite cell algorithm for disease outbreak detection model by Mohamad Mohsin, Mohamad Farhan, Hamdan, Abdul Razak, Abu Bakar, Azuraliza

    Published 2014
    “…The characteristics of early outbreak signal which are weak and behaved under uncertainties has brought to the development of outbreak detection model based on dendrite cell algorithm.Although the algorithm is proven can improve detection performance, it relies on several parameters which need to be defined before mining.In this study, the most appropriate parameter setting for outbreak detection using dendrite cell algorithm is examined.The experiment includes four parameters; the number of cell cycle update, the number of dendrite cell allowed to be in population, weight, and migration threshold value. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In this research, a fault diagnosis methodology based on Cross Industry Standard Process for Data Mining (CRISP-DM) model was proposed for the purpose of damage detection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Comparative analysis of K-Means and K-Medoids for clustering exam questions / Nurul Zafirah Mokhtar by Mokhtar, Nurul Zafirah

    Published 2016
    “…Each and every attribute and parameters selected undergo several process of data mining starting from pre-processing until the analysis of the data. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  8. 8

    An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning by Islam, Md Kamrul

    Published 2019
    “…The experiment on noisy data stream shows that BOCEDS algorithm can detect noise with an accuracy of approximately 100%. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11
  12. 12

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    A buffer-based online clustering for evolving data stream by Islam, Md. Kamrul, Ahmed, Md. Manjur, Kamal Z., Zamli

    Published 2019
    “…The sensitivity of clustering parameters is also measured. The proposed algorithm is then applied to real-world weather data streams to demonstrate its capability to detect changes in data stream and discover arbitrarily shaped clusters. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Predicting heart disease using ant colony optimization / Siti Aisyah Ismail by Ismail, Siti Aisyah

    Published 2021
    “…Thus, this study used the Ant Colony Optimization algorithm with data mining called Ant-Miner to predict heart disease because it is said that Ant-Miner’s rule list is simpler than other rule induction algorithms. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19
  20. 20

    Application of terrain analysis to the mapping and spatial pattern analysis of subsurface geological fractures of Kuala Lumpur limestone bedrock, Malaysia. by Mansor, Shattri, Mahmud, Ahmad Rodzi, Kim Huat, Bujang, Elmahdy, Samy Ismail

    Published 2012
    “…The first involves geological prediction and visual interpretation of terrain parameters using a digital elevation model (DEM). The second is an automatic detection method using a topographical fabric algorithm that uses a DEM to create a map of ridges, which represent the footwalls of geological fractures, and valleys (channels), which reflect geological fracture zones. …”
    Get full text
    Get full text
    Article