Search Results - (( solution integration prediction algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Evaluation of machine learning algorithms in predicting CO 2 internal corrosion in oil and gas pipelines by Mohammad Zubir, W.M.A., Abdul Aziz, I., Jaafar, J.

    Published 2019
    “…This creates a demand of utilizing machine learning in predicting corrosion occurrence. This paper discusses on the evaluation of machine learning algorithms in predicting CO 2 internal corrosion rate. …”
    Get full text
    Get full text
    Article
  8. 8

    Evaluation of machine learning algorithms in predicting CO2 internal corrosion in oil and gas pipelines by Mohammad Zubir, W.M.A., Abdul Aziz, I., Jaafar, J.

    Published 2019
    “…This creates a demand of utilizing machine learning in predicting corrosion occurrence. This paper discusses on the evaluation of machine learning algorithms in predicting CO2 internal corrosion rate. …”
    Get full text
    Get full text
    Article
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive mesh refinement immersed boundary method for simulations of laminar flows past a moving thin elastic structure by Aldlemy, M.S., Rasani, M.R., Ariffin, A.K., Ya, T.M.Y.S.T.

    Published 2020
    “…The cut-cell IBM is used to predict the body forces while FEM is used to predict deformation of the thin elastic structure in order to integrate the motions of the fluid and solid at the interface. …”
    Get full text
    Get full text
    Article
  11. 11

    Depth linear discrimination-oriented feature selection method based on adaptive sine cosine algorithm for software defect prediction by Nasser, Abdullah, H.M. Ghanem, Waheed Ali, H.Y. Saad, Abdul-Malik, Hamed Abdul-Qawy, Antar Shaddad, A. Ghaleb, Sanaa A, Mohammed Alduais, Nayef Abdulwahab, Din, Fakhrud, Ghetas, Mohamed

    Published 2024
    “…DASC-FS integrates the Adaptive Sine Cosine Algorithm (ASCA) as a search algorithm to determine the relevant features and adopts Depth Linear Discriminant Analysis (D-LDA) to identify the discriminative features that maximize class sepa ration. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    ENGINEERING DESIGN WITH PSO ALGORITHM by MHD BASIR, SITI NUR HAJAR

    Published 2019
    “…Creating a PSO algorithm-based infrastructure integrating with the recommendation system will further enhance solution to the design problem. …”
    Get full text
    Get full text
    Final Year Project
  13. 13

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  14. 14

    Adaptive security architecture for protecting RESTful web services in enterprise computing environment by Beer, M.I., Hassan, M.F.

    Published 2018
    “…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
    Get full text
    Get full text
    Article
  15. 15

    Customer purchase prediction and product recommendations by Wong, Ji Hin

    Published 2024
    “…This project tries to provide an integrated solution that can improve the customer satisfaction and produce revenue growth by using the strength of data analytics. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Optimization and prediction of battery electric vehicle driving range using adaptive fuzzy technique by Abulifa, Abdulhadi Abdulsalam

    Published 2022
    “…The study also developed an algorithm for predictive EMS using fuzzy model predictive control technique based on regression algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Ontology-based metabolic pathway prediction using saccharomyces cerevisiae data from genbank, ecocyc and kegg by Zakaria, Yuslina

    Published 2006
    “…This research presents the integration of ontology and metabolic pathway prediction algorithm as a possible solution for predicting metabolic pathways. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Gravitational Search Algorithm Based LSTM Deep Neural Network for Battery Capacity and Remaining Useful Life Prediction With Uncertainty by Reza M.S., Hannan M.A., Mansor M.B., Ker P.J., Tiong S.K., Hossain M.J.

    Published 2025
    “…This paper presents an improved approach for predicting the RUL and capacity of LIB using a long short-term memory (LSTM) deep neural network-integrated with a gravitational search algorithm (GSA) to address the challenges associated with predicting battery life. …”
    Article
  19. 19

    Deep continual learning for predicting blast-induced overbreak in tunnel construction / He Biao by He , Biao

    Published 2024
    “…Third, the overbreak prediction model is further integrated with metaheuristic algorithms, aiming to identify the optimal blasting parameters that can minimize overbreak. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi by Nassirtoussi, Arman Khadjeh

    Published 2015
    “…The second layer is termed Sentiment Integration Layer, which integrates sentiment analysis capability into the algorithm by proposing a sentiment weight by the name of SumScore that reflects investors’ sentiment. …”
    Get full text
    Get full text
    Thesis