Search Results - (( variable discriminant learning algorithm ) OR ( java application mining algorithm ))

  • Showing 1 - 20 results of 20
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9

    Machine Learning Classifications of Multiple Organ Failures in a Malaysian Intensive Care Unit by Shah N.N.H., Razak N.N.A., Razak A.A., Abu-Samah A., Suhaimi F.M., Jamaluddin U.

    Published 2025
    “…This study demonstrates the performances of different machine learning algorithms in the classification of multiple organ failures. …”
    Article
  10. 10

    Machine learning classifications of multiple organ failures in a malaysian intensive care unit by Norliyana, Nor Hisham Shah, Normy Norfiza, Abdul Razak, Athirah, Abdul Razak, Asma’, Abu-Samah, Fatanah, M. Suhaimi, Ummu Kulthum, Jamaludin

    Published 2024
    “…Several machine learning algorithms which are decision tree, linear discriminant, naïve Bayes, support vector machines, k-nearest neighbor, AdaBoost, and random forest were used for the classification. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0 by Chong, Agnes Wen Lin

    Published 2023
    “…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Optimized conditioning factors using machine learning techniques for groundwater potential mapping by Kalantar, Bahareh, Al-Najjar, Husam A. H., Pradhan, Biswajeet, Saeidi, Vahideh, Abdul Halin, Alfian, Ueda, Naonori, Naghibi, Seyed Amir

    Published 2019
    “…In addition, 917 spring locations were identified and used to train and test three machine learning algorithms, namely Mixture Discriminant Analysis (MDA), Linear Discriminant Analysis (LDA) and Random Forest (RF). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
    Get full text
    Monograph
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…The second algorithm reduces the quantity of interest regions by using the Extremal Region Selection (ERS) algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Diagnostic power of resting-state fMRI for detection of network connectivity in Alzheimer's disease and mild cognitive impairment: a systematic review by Ibrahim, Buhari, Suppiah, Subapriya, Ibrahim, Normala, Mohamad, Mazlyfarina, Abu Hassan, Hasyma, Syed Nasser, Nisha, Saripan, M. Iqbal

    Published 2021
    “…We conducted a systematic review aimed at determining the diagnostic power of rs-fMRI to identify FC abnormalities in the DMN of patients with AD or MCI compared with healthy controls (HCs) using machine learning (ML) methods. Multimodal support vector machine (SVM) algorithm was the commonest form of ML method utilized. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Evaluation of multiple In Situ and remote sensing system for early detection of Ganoderma boninense infected oil palm by Ahmadi, Seyedeh Parisa

    Published 2018
    “…Various artificial neural network (ANN) architectures were applied to the datasets to verify the proficiency of various combinations of input variables, learning optimization methods and different numbers of neurons on the hidden layer by MATLAB 2014a software. …”
    Get full text
    Get full text
    Get full text
    Thesis