Search Results - (( parameter evaluation drops algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Machine learning methods for herschel-bulkley fluids in annulus: Pressure drop predictions and algorithm performance evaluation by Kumar, A., Ridha, S., Ganet, T., Vasant, P., Ilyas, S.U.

    Published 2020
    “…The impact of each input parameter affecting the pressure drop is quantified using the RF algorithm. …”
    Get full text
    Get full text
    Article
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Article
  10. 10

    Performance evaluation of corner effect in UMTS / Nurzaliza Ghazali by Ghazali, Nurzaliza

    Published 2009
    “…Meanwhile, parameter RSCP is used to measure the percentage of signal dropped. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Time based internet traffic policing and shaping with Weibull traffic model / Mohd Azrul Abdullah by Abdullah, Mohd Azrul

    Published 2015
    “…Two important Weibull parameters which are shape and scale are measured. Based on the identified statistical parameters, a new Time Based Policing and Shaping algorithm is developed and simulated. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Markov-modulated Bernoulli-based Performance Analysis for BLUE Algorithm under Bursty and Correlated Traffics by Saaidah, AM, Jali, MZ, Marhusin, MF, Abdel-Jaber, H

    Published 2024
    “…The MMBP is used to replace the conventional and widely-used Bernoulli process (BP) in evaluating and proposing analytical models based on the BLUE algorithm. …”
    Proceedings Paper
  15. 15

    Vehicle pick-up and drop-off schedule optimization in a university setting by Teo, Chun Kit

    Published 2024
    “…Extensive experiments validate the algorithm’s effectiveness, optimize parameters, and demonstrate the dynamic handler's ability to manage real-time requests accurately. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  19. 19

    Performance evaluation of manet in presence of black hole nodes by Dhahir, Saif Mahmood

    Published 2017
    “…And then we will apply an algorithm that can offer better performance evaluation of the MANET compare to previous work[1]. …”
    Get full text
    Get full text
    Thesis
  20. 20