Search Results - (( values using process algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The results reveal that the proposed hybrid algorithm is capable of achieving classification accuracy values of (95.82 % and 97.68 %), detection rates values of (95.8 % and 99.3 %) and false alarm rates values of (0.083 % and 0.045 %) on both KDD CUP 99 and NSL KDD. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…However, prediction gain, tracking ability and convergence speed of quaternion adaptive filters still need to be improved due to the fixed step size of those types of algorithms. Choosing the right value of step size is very important for the adaptation process of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Facial Drowsiness Signs Detection Algorithm Using Image Processing Techniques For Various Lighting Condition by Yuri, Nur Fatin Izzati

    Published 2017
    “…Four lighting conditions are proposed with the average range of 0 luminance value to 175 luminance value. In this project, the algorithm is developed based on four main algorithms which are the detection algorithm, the tracking algorithm, the preprocessing algorithm and the drowsiness signs analysis algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Environmental Assessment of Alkali-Catalysed Biodiesel Process Using War Algorithm by Siti Faiznur, Daud

    Published 2013
    “…Hence to determine the PEI value, WAR Algorithm is then introduced. It is used to evaluate the environmental friendliness of a process and was carried out by using the developed Microsoft Excel spread sheet. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Ant colony optimization algorithm for load balancing in grid computing by Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2012
    “…Global pheromone update is performed after the completion of processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization. …”
    Get full text
    Get full text
    Get full text
    Monograph
  13. 13

    Enhancing Classification Algorithms with Metaheuristic Technique by Cokro, Nurwinto, Tri Basuki, Kurniawan, Misinem, ., Tata, Sutabri, Yesi Novaria, Kunang

    Published 2024
    “…Implementing this process uses classification algorithms such asNaïve Bayes, Support Vector Machine,and Random Forest. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…Only odd decimal values can be used in a public key using the Tripathi algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Due to the center biased nature of the videos, the HPSO algorithm uses an initial pattern (hexagon-shaped) to speed up the convergence of the algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Self-similar network traffic using Random Midpoint Displacement (RMD) algorithm / Jumaliah Saarini by Saarini, Jumaliah

    Published 2006
    “…As a conclusion, using RMD algorithm the result are more satisfy compare using the traditional process because the result are more accurate are more faster. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Loop-based RSA Key Generation Algorithm using String Identity by Norhidayah, Muhammad, Jasni, Mohamad Zain, Md Yazid, Mohd Saman

    Published 2013
    “…The differences between i-RSA and previous algorithm are looping process in key generation, to get new value of p and q parameter, looping process will stop when value of k is equal to 1, and the email can be a public key. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Modelling and environmental assessment of heterogeneous catalysis biodiesel process using war algorithm by As Eleyana, Ali

    Published 2013
    “…WAR algorithm which acts as a comparison tool in selecting the environmentally benign design option is developed using heterogeneous catalysis and alkali homogeneous catalysis of biodiesel process as case study. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Multi-objectives process optimization in end milling process of aluminium alloy 6061-T6 using genetic algorithm by W., Safiei, Rahman, M. M., M.Y., Ali

    Published 2024
    “…Therefore, this paper aims to obtain optimum conditions of ethe nd milling process for three cutting inserts with multi-objective parameters using a combination of mathematical modelling and genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item