Search Results - (( using claim process algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Database encryption for a Web-based Claims System by Syed Zulkarnain Syed Idrus

    Published 2008
    “…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
    Get full text
    Thesis
  8. 8

    Risk analysis of the copula dependent aggregate discounted claims with Weibull inter-arrival time by Siti Norafidah Mohd Ramli, Sharifah Farah Syed Yusoff Alhabshi, Nur Atikah Mohamed Rozali

    Published 2021
    “…We use a copula to represent the dependence structure between the inter-claim arrival time and its subsequent claim amount. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  10. 10

    Static and self-scalable filter range selection algorithms for peer-to-peer networks by Kweh, Yeah Lun

    Published 2011
    “…The static filter range selection algorithm uses a fixed filter range approach to locate the target key, in which the filter range is preset at the beginning of the searching process. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz by Ab. Aziz, Ahmad Syahir

    Published 2017
    “…There are six steps of genetic algorithm. The prototype is useful to worker in construction calculate the total number of parking spaces in the future.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Fractional Stochastic Gradient Descent Based Learning Algorithm For Multi-layer Perceptron Neural Networks by Sadiq, A., Yahya, N.

    Published 2021
    “…In this study, we propose a learning algorithm for the training of MLP models. Conventionally back-propagation learning algorithm also termed as (BP-MLP) is used. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Encryption selection for WLAN IEEE802.11G by Ahmad, Zahrol Azam

    Published 2013
    “…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
    Get full text
    Get full text
    Thesis
  15. 15

    FEATURES EXTRACTION OF FINGERPRINTS BASED ON HYBRID PARTICLE SWARM OPTIMIZATION AND BAT ALGORITHMS by Ahmed A.L., Hassoon N., Hak L.A.L., Edan M., Abed H., Abd S.

    Published 2023
    “…That means the hybrid (PSO-BA) algorithm has the better results, which means it can be used as one of the best search approaches to extract features from fingerprints � 2022, Authors. …”
    Article
  16. 16

    Soap performance enhancement for high volume messaging / Ali Baba Dauda by Ali Baba , Dauda

    Published 2018
    “…SOAP is one of the best protocols using XML to exchange message but the XML is too verbose and slows the communication process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Effective software fault localization based on complex network theory / Abubakar Zakari by Abubakar , Zakari

    Published 2019
    “…This has led researchers to adopt approaches such as one bug-at-a-time debugging approach (OBA) and parallel debugging approach. However, using OBA debugging approach increases software time-to-delivery and potentially leads to more faults during regression testing, while utilizing k-mean clustering algorithm with Euclidean distance metric to group failed tests based on their execution profile similarity in parallel debugging approach is claimed to be problematic and inappropriate. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…In other words, this research will discuss the application of genetic algorithm to optimize the feature construction process from the Coral Reefs data to generate input data for the data summarization method called Dynamic Aggregation of Relational Attributes (DARA). …”
    Get full text
    Get full text
    Research Report
  20. 20

    Designing substitution boxes based on chaotic map and globalized firefly algorithm by Ahmed, Hussam Alddin Shihab

    Published 2019
    “…The FA is a newly developed metaheuristic algorithm inspired by fireflies and their flash lighting process. …”
    Get full text
    Get full text
    Thesis