Search Results - (( programming current practices algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Online Programming Judge System (UOJ) by Tran , Quang Trung

    Published 2013
    “…This research conducts a study to build an Online Programming Judge system with a mechanism to generate test cases automatically using Particle Swarm Optimization (PSO) algorithm. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming by Hussien, Hassan Mansur, Md Yasin, Sharifah, Muda, Zaiton, Udzir, Nur Izura

    Published 2019
    “…In relation to this, a new theoretical attack such as related-key differential cryptanalysis (RDC) could give rise to a more practical technique. Basically, estimating immunity of lower bounds in the substitution-permutation network (SPN) block ciphers structure against RDC attack is essential for providing a secure block cipher algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    CONTINGENCY ANALYSIS OF POWER SYSTEM NETWORKS by ABDUL RAUF, MOHD HAFIZ

    Published 2006
    “…This project presents an alternative way of conducting power flow analysis in determining the new bus voltages and line currents during outage occurrence. The algorithms have been accommodated in one complete program making it an effective tool for contingency analysis. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Optimal timber transportation planning in tropical hill forest using bees algorithm by Jamaluddin, Jamhuri

    Published 2022
    “…Given the finding of this study, the optimisation of the BA model has a better performance than the current practice of forest road planning in Malaysia. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Analysis Of Human Detection Method In Social Distancing Monitoring by Nur Aina Syafinaz, Muhamad Atfan

    Published 2022
    “…This study concludes that the use of current proposed object detection algorithms can be used to detect humans and the Euclidean distance method is successfully implemented together with the object detection algorithm…”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Box-jenkins and genetic algorithm hybrid model for electricity forecasting system by Mahpol, Khairil Asmani

    Published 2005
    “…It also represents a preliminary work in the current research and practices of GA. The investigation is simulated using Intelligent Electricity Forecasting System (IEFS) developed in this research which written in Borland Delphi 7.0 programming.…”
    Get full text
    Get full text
    Thesis
  15. 15

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…The research employs Extreme Programming (XP) methodologies to ensure high-quality code, agility, and collaborative development. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Analyzing surface settlement factors in single and twin tunnels : A review study by Huat, Chia Yu, Danial Jahed, Armaghani, Lai, Sai Hin, Hossein, Motaghedi, Panagiotis G., Asteris, Pouyan, Fakharin

    Published 2024
    “…The study underscores the importance of proper management of tunneling operations, including optimizing face pressure, to mitigate SS risks. Practical implications for practicing engineers include thorough site investigations, risk assessments and comprehensive monitoring programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli by Mohd Ramli, Mohamad Amirul Asyraf

    Published 2023
    “…This research utilizing the Python programming language and the PyCharm integrated development environment (IDE) to integrate coding into the processing. …”
    Get full text
    Get full text
    Student Project
  19. 19

    A simulated annealing approach for redesigning a warehouse network problem by Rozieana, Khairuddin, Zaitul Marlizawati, Zainuddin, Gan, Jia Jiun

    Published 2017
    “…A Simulated Annealing algorithm is proposed to tackle with the proposed model. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Factors predicting health practitioners' awareness of UNHS program in Malaysian non-public hospitals by Ismail, Abdussalaam Iyanda, Abdul Majid, Abdul Halim, Zakaria, Mohd Normani, Abdullah, Nor Azimah Chew, Hamzah, Sulaiman, Mukari, Siti Zamratol-Mai Sarah

    Published 2018
    “…In addition, non-significant relationship between screening techniques and healthcare practitioners' awareness of UNHS program is connected with the fact that the techniques that are practiced among public and non-public hospital are similar and standardized. …”
    Get full text
    Get full text
    Article