Search Results - (( variable create proposed algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Observer-based fault detection with fuzzy variable gains and its application to industrial servo system by Eissa, Magdy Abdullah, Sali, Aduwati, Hassan, Mohd Khair, Bassiuny, A. M., Darwish, Rania R.

    Published 2020
    “…The flexibility and adaptability represent the main objectives of the proposed observer. This work is interested in proposing an observer with fuzzy variable gains for a general nonlinear system. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A PI based coordinated maximum power point tracking controller for grid connected photovoltaic system / Md Haidar Islam by Md Haidar, Islam

    Published 2021
    “…The proposed algorithm enhances the steady-state and dynamic responses by introducing an improved adaptive step-size for updating variables. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing Model Selection Based On Penalized Regression Methods And Empirical Mode Decomposition by Al Jawarneh, Abdullah Suleiman Saleh

    Published 2021
    “…This study aims to apply the proposed SCAD-EMD, adLASSO-EMD, MCP-EMD and ELNET-EMD methods to determine the effect of the decomposition components of the original univariate/multivariate time series predictor variable(s) on the response variable. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…The dropping decision of the redundant RREQ in the NCPR algorithm completely relies on preset variables, such variables require to be set by the system administrator based on the scenario. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Message based random variable length key encryption algorithm. by Mirvaziri, Hamid, Jumari, Kasmiran, Ismail, Mahamod, Mohd Hanapi, Zurina

    Published 2009
    “…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. Conclusion: Random process employed in this block cipher increased confidentiality of the message and dynamic length substitution in proposed algorithm may lead to maximum cryptographic confusion and consequently makes it difficult for cryptanalysis.…”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat by Abdul Samat, Syafiq

    Published 2021
    “…Inspired by some of the generative art made via programming, I was able to create my own algorithmic concept, using these “noises” as factors or variables to affect the creation of the proposed visual. …”
    Get full text
    Get full text
    Book Section
  16. 16

    Projecting image on non-planar surface with zero-th order geometric continuity using simple dual-linear function and manipulation of strict integer implementation in programming la... by Yusoff, Fakhrul Hazman, Azhar, Muhammad Amirul

    Published 2015
    “…Usage of a projection system to display large screen images is still relevant in the midst of LED-based display increasing popularity.This is due to that the system itself is a mature technology, reliable and cheaper than the LED counterpart.While various methods had addressed the projection problems on curve surface, projecting image on jagged like surface (zero order geometric continuity) has yet to be studied in depth.This paper proposes a method for projecting image on non-planar surface with zero-order geometric continuity property using parametric modeling.The method manipulate linear function by combining two functions into one by taking advantage of computer programs strict implementation of integer variables.The method was applied to grid-based texturing algorithm in order to create the desired zero-continuity effect on the surface.The method was compared with texturing that implement existing curve algorithm to project image on the screen.Visual evaluation results showed that the proposed method fared better compared to existing curve-based projection algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Automated model selection for corporation credit risk assessment using machine learning / Zulkifli Halim by Halim, Zulkifli

    Published 2023
    “…For the best practice machine learning pipelines, various machine learning models are used to discover the best model for CCRA study. This study has proposed an automated model selection based on the exhaustive search algorithm—that caused the timeout and memory leak issues. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Using fuzzy association rule mining in cancer classification by Mahmoodian, Sayed Hamid, Marhaban, Mohammad Hamiruce, Abdul Rahim, Raha, Rosli, Rozita, Saripan, M. Iqbal

    Published 2011
    “…At first, different subset of genes which have been selected by different methods, were used to generate primary fuzzy classifiers separately and then proposed algorithm was implemented to mix the genes which have been associated in the primary classifiers and generate a new classifier. …”
    Get full text
    Get full text
    Article
  19. 19

    Similarity distance measure and prioritization algorithm for test case prioritization in software product line testing by Abd Halim, Shahliza, Abang Jawawi, Dayang Norhayati, Sahak, Muhammad

    Published 2019
    “…Among the most promising TCP techniques is similarity-based TCP technique which consists of similarity distance measure and prioritization algorithm. The goal of this paper is to propose an enhanced string distance and prioritization algorithm which could reorder the test cases resulting to higher rate of fault detection. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Controlling traffic for clean air and healthy cities with multi-fuzzy inference systems for a sustainable future by Muhammad Aria Rajasa Pohan, Jana Utama

    Published 2025
    “…Therefore, the algorithm in this study has the potential to be further developed to help reduce traffic congestion in big cities; thus, it can be a sustainable solution to create cleaner, healthier, and more sustainable cities in the future.…”
    Get full text
    Get full text
    Get full text
    Article