Search Results - (( using composition mining algorithm ) OR ( java application force algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1
  2. 2

    Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan by Meisam , Gordan

    Published 2020
    “…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining by H’ng, Choo Wooi

    Published 2019
    “…Findings showed that the numerical predictions on FT and ST (RRSE ~ 25%) were about two folds better than the WT and SWT (RRSE ~50%) in the six algorithms tested. The best prediction performance was gained on FT indicator using the M5P algorithm (RRSE = 22.44%). …”
    Get full text
    Get full text
    Thesis
  4. 4

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  5. 5

    Seed disperser ant algorithm for optimization / Chang Wen Liang by Chang , Wen Liang

    Published 2018
    “…The classical benchmark problems and composite benchmark functions from Congress on Evolutionary Computation (CEC) 2005 special session is used for validate SDAA. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system by Ahmad Zainaddin, Dahlia Asyiqin, Mohd Hanapi, Zurina

    Published 2013
    “…In recent years, data mining approach for intrusion detection have been advised and used. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9