Search Results - (( variable representation based algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Switching algorithm to avoid attitude representation singularity by Okasha, Mohamed Elsayed Aly Abd Elaziz, Newman, Brett

    Published 2009
    “…This description may possess computational savings and allow continued use of insightful variables when compared with nonminimal representations such as Euler parameters. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    A review of crossover methods and problem representation of genetic algorithm in recent engineering applications by Zainuddin, Farah Ayiesya, Abd Samad, Md Fahmi

    Published 2020
    “…Genetic algorithm (GA) is a popular technique of optimization that is bio-inspired and based on Charles Darwin's proposed principles of natural genetics and natural selection theories. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Path optimization using genetic algorithm in laser scanning system by Chen C.P., Koh S.P., Aris I.B., Albert F.Y.C., Tiong S.K.

    Published 2023
    “…The GA would base on the real-number representation, namely Real-Coded Genetic Algorithm (RCGA). …”
    Conference paper
  10. 10

    Switching principles to circumvent Euler angle singularity by Okasha, Mohamed Elsayed Aly Abd Elaziz, Newman, Brett

    Published 2010
    “…This description may possess computational savings and allow continued use of insightful variables when compared with nonminimal representations such as Euler parameters. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  11. 11

    Dynamic Bayesian Networks and Variable Length Genetic Algorithm for Dialogue Act Recognition by Ali Yahya, Anwar

    Published 2007
    “…In the selection phase, a new variable length genetic algorithm is applied to select the lexical cues. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Extremal region detection and selection with fuzzy encoding for food recognition by Razali @ Ghazali, Mohd Norhisham

    Published 2019
    “…Three algorithms were used to accomplish the task of feature representation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Path optimization using genetic algorithm in laser scanning system by Chen, Chai Phing, Koh, Johnny Siaw Paw, Aris, Ishak, Fong, Albert Yu Chooi, Tiong, Sieh Kiong

    Published 2008
    “…The GA would base on the real-number representation, namely Real-Coded Genetic Algorithm (RCGA). …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    A Comparative Study Of Fuzzy C-Means And K-Means Clustering Techniques by Sharifah Sakinah, Syed Ahmad

    Published 2014
    “…Then, we apply six datasets to measure the quality of clustering result based on the similarity measure used in the algorithm and its representation of clustering result. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Fault diagnosis by using multi-scale signed directed graph by Ali, H., Maulud, A.S., Zabiri, H., Nawaz, M., Ismail, L.

    Published 2022
    “…It describes and represents the causal relations between the process variables and their effect relations in systems. The conventional SDG fault diagnosis algorithm is a single-scale fault representation origin, and it cannot effectively solve multiple fault representation origins. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan Yin Keong, Tan Yin

    Published 2012
    “…The solution obtained from the LB–MILP model, i.e., the decision variables (binary variables), was used to obtain a feasible solution for model UB–NLP. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End by Tan , Yin Keong

    Published 2009
    “…The solution obtained from the LB-MILP model, i.e., the decision variables (binary variables), was used to obtain a feasible solution for model UB-NLP. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Cryptanalysis of elliptic curve scalar multiplication algorithms by Leong, Zhen Hong

    Published 2025
    “…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis