Search Results - (( programming automatic identification algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Evolutionary Programming (EP) based technique for secure point identification with load shedding technique in power transmission / Abdul Rahman Minhat by Minhat, Abdul Rahman

    Published 2008
    “…The study was initiated by the development of new algorithm for automatic voltage stability assessment (AVSA). …”
    Get full text
    Get full text
    Thesis
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network by Kang, Miew How

    Published 2016
    “…First proposed algorithm is the combination of momentum algorithm with adaptive learning rate (ALR) algorithm, and second proposed algorithm is the combination of momentum algorithm with automatic learning rate selection (ALRS) algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Radio Frequency Identification (RFID) Indoor Parking Control System by El-Hageen, Hazem M. M., Mohammad Ata, Karimeh Ibrahim, Che Soh, Azura, Ishak, Asnor Juraiza, Jaafar, Haslina

    Published 2017
    “…Based on the data, the dynamic programming algorithm embedded in the system will determine the nearest parking location based on their entrance destination to the worker. …”
    Get full text
    Get full text
    Article
  10. 10

    Biometrics: Facial Recognition by Ahmad Zohri, Wan Saarah Zuhri

    Published 2004
    “…Biometrics, a biological measurement and refers to the automatic identification of a person based on his or her physiological or psychological characteristics. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive differential evolution algorithm with fitness based selection of parameters and mutation strategies / Rawaa Dawoud Hassan Al-Dabbagh by Rawaa Dawoud Hassan, Al-Dabbagh

    Published 2015
    “…Secondly, a new DE algorithm (ARDE-SPX) is introduced that automatically adapts a repository of DE strategies and parameters control schemes to avoid the problems of stagnation and make DE respond to a wide range of function characteristics at different stages of evolutionary search. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  14. 14

    New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz by Ab. Aziz, Nur Fadilah

    Published 2014
    “…The competency of VSCI was corroborated in three tasks; weak bus identification, automatic line outage contingency ranking and weak area identification. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Application of artificial neural network in discriminating the agarwood oil quality using significant chemical compounds / Mohd Hezri Fazalul Rahiman … [et al.] by Rahiman, Mohd Hezri Fazalul, Ismail, Nurlaila, Taib, Mohd Nasir, Mohd Ali, Nor Azah, Tajuddin, Saiful Nizam

    Published 2014
    “…The work involves of selected agarwood oil from low and high quality, the extraction of chemical compounds using GC-MS and Z-score to identify the significant compounds as input to the network. The ANN programming algorithm was developed and computed automatically via Matlab software version R2010a. …”
    Get full text
    Get full text
    Get full text
    Book Section
  17. 17