Search Results - (( using competency model algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Academic leadership bio-inspired classification model using negative selection algorithm by Jantan, Hamidah, Sa’dan, Siti ‘Aisyah, Che Azemi, Nur Hamizah Syafiqah

    Published 2015
    “…Managing employee’s competency is considered as the top challenge for human resource professional especially in the process to determine the right person for the right job that is based on their competency.As an alternative approach, this article attempts to propose academic leadership bio-inspired classification model using negative selection algorithm to handle this issue.This study consists of three phases; data preparation, model development and model analysis. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    Competing risks for reliability analysis using Cox’s model by Mohamed Elfaki, Faiz Ahmed, Daud, Isa, Ibrahim, Nor Azowa, Abdullah, M. Y., Usman, Mustofa

    Published 2007
    “…This paper seeks to show that, with a large sample size based on expectation maximization (EM) algorithm, both models give similar results. Design/methodology/approach – The parameters of the models have been estimated by method of maximum likelihood based on EM algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Cutpoint determination methods in competing risks subdistribution model by Noor Akma Ibrahim, Abdul Kudus, Isa Daud, Mohd. Rizam Abu Bakar

    Published 2009
    “…In the analysis involving clinical and psychological data, by transforming a continuous predictor variable into a categorical variable, usually binary, a more interpretable model can be established. Thus, we consider the problem of obtaining a threshold value of a continuous covariate given a competing risk survival time response using a binary partitioning algorithm as a way to optimally partition data into two disjoint sets. …”
    Get full text
    Get full text
    Article
  14. 14

    Cutpoint determination methods in competing risks subdistribution model by Ibrahim, Noor Akma, Kudus, Abdul, Daud, Isa, Abu Bakar, Mohd Rizam

    Published 2009
    “…In the analysis involving clinical and psychological data, by transforming a continuous predictor variable into a categorical variable, usually binary, a more interpretable model can be established. Thus, we consider the problem of obtaining a threshold value of a continuous covariate given a competing risk survival time response using a binary partitioning algorithm as a way to optimally partition data into two disjoint sets. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Furniture form innovation and human–machine comfort evaluation model based on genetic algorithm by Yifan, Bai, Kamarudin, Khairul Manami, Alli, Hassan

    Published 2024
    “…Afterward, a mathematical version is used to symbolize the layout preference problems, and the layout scheme selection method is simulated. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Multiple equations model selection algorithm with iterative estimation method by Kamarudin, Nur Azulia, Ismail, Suzilah

    Published 2016
    “…In particular, an algorithm on model selection for seemingly unrelated regression equations model using iterative feasible generalized least squares estimation method is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Permodelan Rangkaian Neural Buatan Untuk Penilaian Kendiri Teknologi Maklumat Guru Pelatih by Hashim, Asman

    Published 2001
    “…Data containing eleven predictive variables was used to train and test neural network model. The research procedures chosen were the multi-layered perceptron with back propagation algorithmic learning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Parametric and Semiparametric Competing Risks Models for Statistical Process Control with Reliability Analysis by Mohamed Elfaki, Faiz Ahmed

    Published 2004
    “…Residual-based approaches are used to assess the validity of the two models (MW, CC) assumptions. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Em Approach on Influence Measures in Competing Risks Via Proportional Hazard Regression Model by Elfaki, Faiz. A. M.

    Published 2000
    “…In a conventional competing risk s model, the time to failure of a particular experimental unit might be censored and the cause of failure can be known or unknown. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Field data-based mathematical modeling by Bode equations and vector fitting algorithm for renewable energy applications by Sabry, Ahmad H., Wan Hasan, Wan Zuha, Ab Kadir, M. Zainal A., Mohd Radzi, Mohd Amran, Shafie, Suhaidi

    Published 2018
    “…The most powerful features of this method is the ability to model irregular or randomly shaped data and to be applied to any algorithms that estimating models using frequency-domain data to provide state-space or transfer function for the model.…”
    Get full text
    Get full text
    Get full text
    Article