Search Results - (( structures deviation detection algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Deviation detection in text using conceptual graph interchange format and error tolerance dissimilarity function by Kamaruddin, Siti Sakira, Hamdan, Abdul Razak, Abu Bakar, Azuraliza, Mat Nor, Fauzias

    Published 2012
    “…We employ conceptual graphs interchange format (CGIF) – a knowledge representation formalism to capture the structure and semantics of sentences. We propose a novel error tolerance dissimilarity algorithm to detect deviations in the CGIFs. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Development of a computer vision-based technique for analysis of hand therapy exercise by Muhammad Zabri, Abu Bakar

    Published 2018
    “…For this purpose, the ROM exercise was developed by using the hand detection and tracking, fingertips detection, skeleton joints detection algorithms and joint angle measurement algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Examining the heterogeneous regimes of stock market identified with two variants of B-B algorithms that differ in rigidness of specification by Ho, Yew Joe, Mario Arturo Ruiz Estrada, Su, Fei Yap

    Published 2017
    “…The results show that the Candelon et al. (2008) B-B algorithm which is less rigid between the two, detects more frequent switching of regimes, has lower standard deviation and yields higher values of cumulative return and loss. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Antifriction Bearing Malfunction Detection and Diagnostics using Hybrid Approach by Omar, Noraimi

    Published 2018
    “…The vibration signals were obtained from Case Western Reserve University. An algorithm is developed for abnormal condition detection and diagnostics using intelligent systems. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Antifriction Bearing Malfunction Detection and Diagnostics using Hybrid Approach by Omar, Noraimi

    Published 2018
    “…The vibration signals were obtained from Case Western Reserve University. An algorithm is developed for abnormal condition detection and diagnostics using intelligent systems. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Reactive approach for automating exploration and exploitation in ant colony optimization by Allwawi, Rafid Sagban Abbood

    Published 2016
    “…The first component is a reactive max-min ant system algorithm for recording the neighborhood structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…The results showed that the proposed algorithm could provide an efficient structure and procedure by reducing the processing time and minimizing human error. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…The results showed that the proposed algorithm could provide an efficient structure and procedure by reducing the processing time and minimizing human error. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Permutation entropy based full-reference image quality qssessment by Baqar, Mohtashim *, Lau, Sian Lun *, Mansoor Ebrahim

    Published 2019
    “…Motivated by the need of appropriate objective models, we propose a novel objective IQA algorithm, namely, Permutation Entropy Deviation Index (PEDI), based on the working principle of permutation entropy (PE). …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Near infrared palm image acquisition and two-finger valley point-based image extraction for palm vascular pattern detection by Mohd Noh, Zarina

    Published 2019
    “…The palm vascular detection processing was also executed on the self-developed dataset constructed earlier for validation. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhanced Adaptive Neuro-Fuzzy Inference System Classification Method for Intrusion Detection by Jia, Liu

    Published 2024
    “…Furthermore, the proposed method outperforms MVO-ANN, FC-ANN, DN, CSO-ANFIS, single ANFIS, and single ResNet in terms of detection rate, F1-score, and recall rate. Additionally, standard deviation and proposed adaptive K-means algorithms have been employed to minimize the generated rules by ANFIS from the proposed hybrid models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis