Search Results - (( problem based replication algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    A novel deadlock detection algorithm for neighbour replication on grid environment by Noriyani, Mohd Zin

    Published 2012
    “…Therefore, an action must be taken to detect and solve this problem. A new framework and algorithm called Neighbour Replication on Grid Deadlock Detection (NRGDD) has been developed to handle deadlock cycles that exist during the transaction in Neighbour Replication on Grid (NRG) environment. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    A framework for implementing asynchronous replication scheme in utility-based computing environment by Wan Nor Shuhadah, W.N., Zhou, B.B., Zomaya, A.Y., Abawajy, J.H.

    Published 2016
    “…This paper addresses a problem on implementing an asynchronous replication scheme in utility-based computing environment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A Framework for Asynchronous Replication Scheme for Utility-based Computing Environment by Wan Nor Shuhadah, Wan Nik, Zhou, Bing Bing, Zomaya, Albert Y

    Published 2015
    “…This paper addresses a problem on implementing an asynchronous replication scheme in utility-based computing environment. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Routing problem in rectangular mesh network using Dijkstra’s based Greedy method by Noraziah, Adzhar, Shaharuddin, Salleh, Yuhani, Yusof, Muhammad Azrin, Ahmad

    Published 2018
    “…Therefore, developing a shortest path based routing algorithm is in need. In this research, Dijkstra’s algorithm is used to establish the shortest connection for each net. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    An enhanced ant colony system algorithm for dynamic fault tolerance in grid computing by Saufi, Bukhari

    Published 2020
    “…Most fault tolerance algorithms focus on fault handling techniques such as task reprocessing, checkpointing, task replication, penalty, and task migration. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    An Enhanced Simulated Annealing Routing Algorithm for Semi-Diagonal Torus Network by Noraziah, Adzhar, Shaharuddin, Salleh

    Published 2017
    “…In order to achieve this objective, each node must be connected in its shortest way as possible. We start our algorithm by designing shortest path algorithm based on Dijkstra's method. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A Novel Path Prediction Strategy for Tracking Intelligent Travelers by Motlagh, Omid Reza Esmaeili

    Published 2009
    “…Disconnection of the mobile terminal (MT) from the access points (AP) in WLAN-based systems is the example case of the problem. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Outbreak detection model based on danger theory by Mohamad Mohsin, Mohamad Farhan, Abu Bakar, Azuraliza, Hamdan, Abdul Razak

    Published 2014
    “…As a result, an imbalance between high detection rate and low false alarm rate occurs. To solve this problem, this study proposes a novel outbreak detection model based on danger theory; a bio-inspired method that replicates how the human body fights pathogens. …”
    Get full text
    Get full text
    Article
  17. 17

    A novel theoretical and practical methodology for extracting the parameters of the single and double diode Photovoltaic models by Mohammed Ridha, Hussein, Hizam, Hashim, Mirjalili, Seyedali, Othman, Mohammad Lutfi, Ya’acob, Mohammad Effendy, Abualigah, Laith

    Published 2022
    “…Therefore, this paper presents a unique approach known as Hybridized Arithmetic Operation Algorithm based on Efficient Newton Raphson (HAOA ENR ) to experimentally extract the parameters of the single-diode and double-diode PV models at the variability of the climatic changes. …”
    Get full text
    Get full text
    Article
  18. 18

    Face Detection System / Chan Beh Teng by Chan, Beh Teng

    Published 2004
    “…To a layman, it may appear trivial, but to actually implement the necessary steps leading to successful execution of this in n algorithm is difficult and still an unsolved problem in computer vision.The proposed Face Detection System is an application that automates the detection of frontal human faces(s) in a given image. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A guided artificial bee colony (GABC) heuristic for permutation flowshop scheduling problem (PFSP) by Sidek, Noor Azizah

    Published 2021
    “…This study aims to improve NEH, using an enhanced version of Artificial Bee Colony (ABC) algorithm because the original one has the problem of slow converge speed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    GREEDY SINGLE USER AND FAIR MULTIPLE USERS' REPLICA SELECTION DECISION IN DATA GRID by SALIM JARADAT, AYMAN KAMEL

    Published 2013
    “…Replicas of datasets are usually distributed to different sites, and the choice of any replica locations has a significant impact. Replica selection algorithms decide the best replica places based on some criteria. …”
    Get full text
    Get full text
    Thesis