Search Results - (( structures detect selection algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Degree of contribution (DoC) feature selection algorithm for structural brain MRI volumetric features in depression detection by Kuryati, Kipli, Abbas, Z. Kouzani

    Published 2015
    “…An automated algorithm is developed to select brain sMRI volumetric features for the detection of depression…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…A deterministic mutation-based algorithm is introduced to overcome this problem. Identification studies using NARX (Nonlinear AutoRegressive with eXogenous input) models employing simulated systems and real plant data are used to demonstrate that the algorithm is able to detect significant variables and terms faster and to select a simpler model structure than other well-known EC methods.…”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Detection Of Outliers And Structural Breaks In Structural Time Series Model Using Indicator Saturation Approach by Rose, Farid Zamani Che

    Published 2023
    “…Based on the simulation results, the sequential selection algorithm outperformed the non-sequential selection approach in the automatic GETS model selection procedure. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Vibration-based structural damage detection and system identification using wavelet multiresolution analysis / Seyed Alireza Ravanfar by Seyed Alireza, Ravanfar

    Published 2017
    “…This resulted in the high accuracy of the damage detection algorithm. The second proposed method seeks to identify damage in the structural parameters of linear and nonlinear systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Hereditary ratio of adolescent to parent based on lips analysis using canny edge detection / Nor Shamimi Kharuddin by Kharuddin, Nor Shamimi

    Published 2010
    “…This process significantly reduces the amount of data in the image, while preserving the most important structural features of that image. Canny edge detection is considered to be the ideal edge detection algorithm for images that are corrupted with white noise. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Multidimensional Minimization Training Algorithms for Steam Boiler Drum Level Trip Using Artificial Intelligence Monitoring System by Ismail, F. B., Al-Kayiem, Hussain H.

    Published 2010
    “…The one hidden layer with one neuron using BFG training algorithm provides the best optimum neural network structure. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Therefore, the core classifier in the hyper-heuristic approach of Intrusion Detection System (IDS) is developed to the parallel structure NN. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Development Of Hierarchical Skin-Adaboost-Neural Network (H-Skann) For Multiface Detection In Video Surveillance System by Zakaria, Zulhadi

    Published 2017
    “…This thesis proposed a technique to detect multiface in video surveillance application with strategic architecture algorithm based on the hierarchical and structural design. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A stylometry approach for blind linguistic steganalysis model against translation-based steganography by Mohd Lokman, Syiham

    Published 2023
    “…While targeted steganalysis is designed to attack a specific embedding algorithm, blind steganalysis use features extracted or selection from the medium to detect any anomalies that indicate a possibility that a secret data has been embedded within the medium. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Metal artefact correction algorithm based-on DSAT technique for CT images by Osman, Noor Diyana, Salikin, Md Saion, Saripan, M. Iqbal, Abdul Aziz, Mohd Zahri, Mohd Daud, Norfataha

    Published 2014
    “…The proposed artefact correction algorithm was applied to selected artefactual phantom and clinical CT images. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    An efficient detection model of selective forwarding attacks in wireless mesh networks by Khanam, Shapla, Saleem, Habibullah Yusuf, Pathan, Al-Sakib Khan

    Published 2012
    “…In our approach, we also propose a multi-hop acknowledgement based algorithm to analyze and detect the malicious behavior to defend against selective forwarding attacks in WMNs. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Structural health monitoring using adaptive wavelet functions / Seyed Hossein Mahdavi by Seyed Hossein, Mahdavi

    Published 2016
    “…Accordingly, in the second part of this research, the procedure of structural identification and damage detection has been developed by employing the wavelet-based method through the modified genetic algorithms (GAs) to optimally solve inverse problems. …”
    Get full text
    Get full text
    Thesis