Search Results - (( variable information source algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility by Zhang, Xin, Tang, Qing Qing, Cai, Ying Ying

    Published 2024
    “…Data were analyzed using Partial Least Squares-Structural Equation Modeling (PLS-SEM) to examine the relationships between variables. Results: The analysis revealed that all three intrinsic needs—competence, autonomy, and relatedness—along with social media algorithms and source credibility, positively correlated with fitness-related health information use behaviors among youth. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Analysis of robot localisation performance based on extended kalman filter by Che Hassan, Farah Hazwani

    Published 2015
    “…EKF is a technique from estimation theory that combines the information of different uncertain sources to obtain the value of variables. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Characterization of water quality conditions in the Klang River Basin, Malaysia using self organizing map and K-means algorithm by Mohd Sharif, Sharifah, Mohd Kusin, Faradiella, Asha’ari, Zulfa Hanan, Aris, Ahmad Zaharin

    Published 2015
    “…This study aimed to determine the spatiotemporal pattern of the water quality data and identifying the sources of pollution in the Klang River Basin. The self organizing map (SOM) combined with the K-means algorithm arranged the data based on the relationships of 25 variables. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Gene Selection For Cancer Classification Based On Xgboost Classifier by Teo, Voon Chuan

    Published 2022
    “…XGBoost Classifier is applied in this research, which it is an efficient open-source implementation of the gradient boosted trees algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms by Rachmad, Iqbal, Tri Basuki, Kurniawan, Misinem, ., Edi Surya, Negara, Tata, Sutabri

    Published 2024
    “…Feature extraction is essential in classification, especially for data sources in the form of images. It involves identifying and isolating relevant information from the images that classification algorithms can use to distinguish between different fruit categories. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Antidepressant Treatment Response Prediction With Early Assessment of Functional Near-Infrared Spectroscopy and Micro-RNA by Lee, Lok Hua, Ho, Cyrus Su Hui, Chan, Yee Ling, Tay, Gabrielle Wann Nii, Lu, Cheng-Kai, Tang, Tong Boon

    Published 2025
    “…The performance of the proposed custom algorithm suggests the prediction of ATR can be improved with multiple features sources, provided that the inter-subject variability is properly addressed, and can be an effective tool for clinical decision support system in MDD ATR prediction. …”
    Get full text
    Get full text
    Article
  15. 15

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan Yin Keong, Tan Yin

    Published 2012
    “…Hence, most of the exposition on the model formulation and solution algorithms are taken directly from the original papers so as to provide the readers with the most accurate information possible.…”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan , Yin Keong

    Published 2009
    “…Hence, most of the exposition on the model formulation and solution algorithms are taken directly from the original papers so as to provide the readers with the most accurate information possible. …”
    Get full text
    Get full text
    Final Year Project
  17. 17
  18. 18

    Evalvid-RASV: Shaped VBR rate adaptation stored video system by Che Mohamed Arif, Ahmad Suki, Hassan, Suhaidi, Ghazali, Osman, Awang Nor, Shahrudin

    Published 2010
    “…Video traffic is a variable bit rates (VBR data source in nature and it generates highly bursty traffic.Recent implementations mostly buffer the media source in order to regenerate it in the form of constant bit rates (CBR).Consequently, it will add more delays to the system and thus unable to support the original nature of the video data.Inspired by the works of Hamdi et al. and Lie and Klaue, we developed Evalvid-RASV. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    ANALYSIS OF PERFORMANCE PARAMETERS FOR WIRELESS NETWORK USING SWITCHING MULTIPLE ACCESS CONTROL METHOD by Shijer S.S., Sabry A.H.

    Published 2023
    “…Three control access is processed; polling, token passing, and reservation algorithms for collision avoidance. The reservation stage reserves the data before sending, which includes two timeline intervals; a fixed-time reservation period, and variable data transmission interval. …”
    Article