Search Results - (( processes specification max algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2
  3. 3

    Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia by Hindia, Mhd Nour

    Published 2015
    “…Then, a multi criteria with two-threshold algorithm is proposed to prioritize the selection between the LTE and WiMAX as target technologies. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Lambda-max criteria weight determination in an adaptive neuro-fuzzy inference system / Rosma Mohd Dom, Daud Mohamad and Ajab Bai Akbarally by Mohd Dom, Rosma, Mohamad, Daud, Akbarally, Ajab Bai

    Published 2012
    “…A neuro-fuzzy system is a fuzzy system that uses learning algorithms derived from or inspired by neural network theory to determine its parameters (fuzzy sets and fuzzy rules) by processing data samples. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Metaheuristic optimization techniques for localization in outdoor wireless sensor networks: a comprehensive review by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2025
    “…Each sensor node is responsible for collecting specific data and transmitting it to the processing center. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12

    The effect of data preprocessing on the performance of artificial neural networks techniques for classification problems by Atomi, Walid Hasen

    Published 2012
    “…Specifically Min-Max, Z-Score and Decimal Scaling Normalization preprocessing techniques were evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain by Bahrain, Siti Nurul Izzah

    Published 2024
    “…Face anti-spoofing is a revolutionary technology involved in various aspects of daily life. Specifically, facial anti-spoofing is a detection process that involves using printed or even keepsakes to mimic genuine facial appearances, and it is related to the facial detection application. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Automated plaque classification using computed tomography angiography and Gabor transformations by Acharya, U. Rajendra, Meiburger, Kristen Mariko, Wei Koh, Joel En, Vicnesh, Jahmunah, Ciaccio, Edward J., Shu Lih, Oh, Tan, Sock Keow, Raja Aman, Raja Rizal Azman, Molinari, Filippo, Ng, Kwan Hoong

    Published 2019
    “…The automated technique is based on various features that are extracted from the Gabor transform of the acquired CTA images. Specifically, seven features are extracted from the Gabor coefficients: energy, and Kapur, Max, Rényi, Shannon, Vajda, and Yager entropies. …”
    Get full text
    Get full text
    Article
  17. 17

    Lysine and methionine production from agro-waste submerged fermentation using locally isolated lactic acid bacteria by Muhamad Nor, Norfarina

    Published 2016
    “…Prediction of ANN models indicated that using molasses (10.02 g/L), fish meal (18 g/L), glutamic acid (1.17 g/L) and initial medium pH (4.26) was the greatest combination.The cultivation of P. pentosaceus RF-1 for lysine-methionine productions was carried out in 2 L stirred-tank bioreactor using batch and continuous mode of operations. The maximum specific growth rate (μmax) of 0.306 h-1 was obtained during the batch cultivation process. …”
    Get full text
    Get full text
    Get full text
    Thesis