Search Results - (( using action issues algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions by Goh, Kwang Yi, Baharom, Salmi, Din, Jamilah

    Published 2022
    “…Furthermore, the proposed techniques based on the Q-Learning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
    Get full text
    Get full text
    Article
  10. 10

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…From the reviews, it is evident that autonomous system is set to handle finite number of encountered states using finite sequences of actions. In order to learn the optimized states-action policy the self-learning algorithm is developed using hybrid AI algorithm by combining unsupervised weightless neural network, which employs AUTOWiSARD and reinforcement learning algorithm, which employs Q-learning. …”
    Get full text
    Get full text
    Thesis
  11. 11

    PREDICTIVE ANALYTICS FOR EQUIPMENT FAILURE BY USING GATED RECURRENT UNIT – GENETIC ALGORITHM (GRU – GA) by ZAINUDDIN, ZAHIRAH

    Published 2023
    “…Gated Recurrent Unit (GRU) algorithm is used to cater the predicting action of equipment state based on data from an oil and gas industry.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Application of reinforcement learning to wireless sensor networks: models and algorithms by Yau, Alvin Kok-Lim *, Goh, Hock Guan *, Chieng, David, Kwong, Kae Hsiang

    Published 2015
    “…This covers many components and features of RL, such as state, action and reward. This article presents how most schemes in WSNs have been approached using the traditional and enhanced RL models and algorithms. …”
    Get full text
    Get full text
    Article
  13. 13

    Simulation of an adaptive artificial neural network for power system security enhancement including control action by Al-Masri, Ahmed Naufal A., Ab Kadir, Mohd Zainal Abidin, Hizam, Hashim, Mariun, Norman

    Published 2015
    “…This paper presents a new method for enhancing power system security, including a remedial action, using an artificial neural network (ANN) technique. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    The effectiveness of using the Lattice in multiplication skills among Year 5 in SK Beradek / Muhamad Shaharudin Muhamad Sarip by Muhamad Sarip, Muhamad Shaharudin

    Published 2015
    “…This study was conducted based on Kurt Lewin's research model involves five main steps of identifying aspects of practice, designing an action plan, implementing the plan of action, the effect of the action, and reflection on all the action. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Distributed learning based energy-efficient operations in small cell networks by Mughees, Amna

    Published 2023
    “…To achieve these goals, a cell selection algorithm is proposed that overcomes the issues of conflicts and load imbalance while reducing energy consumption. …”
    Get full text
    Get full text
    Thesis
  17. 17

    A Chameleon algorithm for solving economic dispatch problem in microgrid system by Zahraoui Y., Alhamrouni I., Mekhilef S., Kor�tko T., Jusoh A., Sutikno T.

    Published 2024
    “…The obtained results from the simulation are compared with the conventional metaheuristic algorithms which have been used in previous studies, such as particle swarm optimization (PSO), genetic algorithm (GA), and artificial bee colony (ABC). …”
    Article
  18. 18

    Property premises intruders detection using face recognition method / Joveni Henry by Joveni Henry

    Published 2017
    “…Every property premises owner have already taken some action to protect their property premises and safety by using all kinds of methods. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20