Search Results - (( simulation activation detection algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Web Camera Application For Motion Detection by Koay, Su Yeong

    Published 2003
    “…The algorithm that was successfully simulated is used as the reference for forming the working mechanism in creating motion detection software. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Fraud detection in telecommunication using pattern recognition method / Mohd Izhan Mohd Yusoff by Mohd Yusoff, Mohd Izhan

    Published 2014
    “…The new algorithm is tested on simulated and real data where the results show it is capable of detecting fraud activities. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Evaluation of reference signal estimation techniques for the control of shunt active power filter by Atan N.B., Yunus B.B.

    Published 2023
    “…The system is modeled and simulated using MATLAB/Simulink simulation package with a shunt active power filter to compensate for the harmonics current injected by the loads. …”
    Conference paper
  11. 11

    Broken Conductor Detection on Power Distribution Feeder by Sulaiman , Marizan, Tawafan, Adnan, Ibrahim, Zulkifilie

    Published 2013
    “…It proposes an intelligent algorithm using the Fuzzy Subtractive Clustering Model (FSCM) to detect the high impedance fault. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Cyber Terrorist Detection by using Integration of Krill Herd and Simulated Annealing Algorithms by Al-Sukhni, HAH, Bin Ahmad, A, Madihah Mohd Saudi, Najwa Hayaati Mohd Alwi

    Published 2024
    “…This paper presents a technique to detect cyber terrorists suspected activities over the net by integrating the Krill Herd and Simulated Annealing algorithms. …”
    Article
  13. 13

    Reactive power imbalance method for islanding detection in micro-grid operation by Shamshiri, Meysam, Sapar, Ahmad Farid, Chin, Kim Gan, Tengga Daram, Revinnath, Ab Ghani, Mohd Ruddin

    Published 2014
    “…As the result, the performance of the Reactive Power Imbalance method for the islanding detection state is compared with the simulation model without control algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Novel voice activity detection based on cepstrum moments by Farzan, Ali, Nourmohammadi, Ali, Mashohor, Syamsiah, Sadra, Sarvin

    Published 2010
    “…Statistical methods for voice activity detection (VAD) have shown impressive performance especially with respect to their ability to be tuned parametrically and adoptability with deferent environments. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16
  17. 17

    Combination of GREEN and SHRed AQM for short-lived traffic by Shaii, Ahmad Qadafi, Ismail, Roslan, Jais, Jamilin

    Published 2008
    “…To evaluate the performance of new algorithm, network simulation has been done using NS-2 simulation.This study provides a series of NS-2 experiments to investigate the behavior of new algorithm.The results show improvement on short-lived traffic.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Detecting High Impedance Fault in Power Distribution Feeder with Fuzzy Subtractive Clustering Model by Sulaiman , Marizan, Adnan, Tawafan, Ibrahim, Zulkifilie

    Published 2013
    “…This paper presents the algorithm for HIF detection based on the amplitude of third and fifth harmonics of current, voltage and power. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Botnet detection using automated script / Norfathin Rosli by Rosli, Norfathin

    Published 2020
    “…Nowadays, as we know the virus or malware spread can be so fast and usually hard to detect. This simulation is to detect the Botnet presence and identifying its behaviour. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Embedded wearable EEG seizure detection in ambulatory state by Shakir, M., Malik, A.S., Kamel, N., Qidwai, U.

    Published 2014
    “…The wearable devices allow the user to continue daily activities while being monitored for seizure activities. …”
    Get full text
    Get full text
    Article