Search Results - (( chain integration method algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Solving the integrated inventory supply chain problems using meta-heuristic methods / Seyed Mohsen Mousavi by Seyed Mohsen , Mousavi

    Published 2018
    “…A Modified Particle Swarm Optimization (MPSO) algorithm, a Genetic Algorithm (GA), a modified fruit fly optimization algorithm (MFOA) and a simulated annealing (SA) algorithm were used to find the optimal solution. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Integrated supply chain planning under uncertainty using an improved stochastic approach by Mohammadi Bidhandi, Hadi, Mohd Yusuff, Rosnah

    Published 2011
    “…This paper proposes an integrated model and a modified solution method for solving supply chain network design problems under uncertainty. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar by Subri, Syarul Haniz

    Published 2006
    “…This research involved three main components - corner detector, chain code, and neural network. The integration of these components produced a corner detector algorithm and this algorithm can be used in the engine of an intelligent sketch interpreter…”
    Get full text
    Get full text
    Thesis
  11. 11

    Development of a two-level trade credit model with shortage for deteriorating products using hybrid metaheuristic algorithm by Molamohamadi, Zohreh

    Published 2015
    “…A hybrid metaheuristic algorithm which combines Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) algorithm, is then developed to solve the established models. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  13. 13

    A review and comparative analysis of predictive models for supply chain demand forecasting by Ibrahim Ahmed Omer, Rehab, Hassan, Raini, S. Abd. Aziz, Madihah

    Published 2026
    “…This paper presents a comparative analysis of traditional forecasting models and machine learning approaches for supply chain demand prediction. This study reviews key techniques, including statistical time-series models, supervised and unsupervised learning algorithms, ensemble methods, and deep learning architectures. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Carbon dioxide management for product supply chain and total site utilisation and storage by Mohd Nawi, Wan Norlinda Roshana

    Published 2018
    “…This research proposes a methodology for CO2 emission reduction throughout product supply chain and end-of-pipe management of CO2 via total site integration. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of cost reduction mathematical model for natural gas transmission network system by Mehrdad, Nikbakht Eliaderany

    Published 2012
    “…In addition, a multi-echelon supply chain was designed for NGTSs named Natural Gas Transmission Network Supply Chain (NGTSC). …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Second law considerations in fourier heat conduction of a lattice chain in relation to intermolecular potentials by Christopher, G.J.

    Published 2016
    “…For these harmonic potentials, it appears from the simulation results that steady state solutions exist utilizing non-synthetic thermostats that couple not just the two particles at the extreme ends of the lattice chain, but to a control volume of N particles located at either ends of the chain that does not accord with the unique analytical solutions that obtains for single particle thermostatting at the ends of the lattice with a di�erent thermostatting algorithm that utilizes coupling coe�cients. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    The duality of technological innovation and dynamic capabilities: the micro-foundation of China's construction machinery industry's rise up the global value chain by Xia, Weifu, Alwie, Aryaty, Taasim, Shairil Izwan, Jin, Wong Tze, Naning, Fatin Hana

    Published 2024
    “…Based on organizational learning theory and dynamic capability perspective, this study constructs a theoretical framework of dual integration of technological innovation (exploratory innovation and pioneering innovation) and dynamic capability, and explores its impact mechanism on the global value chain upgrading of Chinese construction machinery enterprises. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Flexible content authorization using digital rights management in cloud computing / Ali Hussain by Ali , Hussain

    Published 2021
    “…The integrity of data is verified with the use of HMAC algorithm chain using the verify function of versifier in Macaroon. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A bayesian via laplace approximation on log-gamma model with censored data by Yusuf, Madaki Umar, Abu Bakar, Mohd Rizam, Husain, Qasim Nasir, Ibrahim, Noor Akma, Arasan, Jayanthi

    Published 2016
    “…Problem/Objective: In this paper we introduce a solution to closed forms of its survival function of the model which shows the suitability and flexibility towards modelling real life data. Methods/Analysis: Alternatively, Bayesian estimation by MCMC simulation using the Random-walk Metropolis algorithm was applied, using AIC and BIC comparison makes it the smallest and great choice for fitting the survival models and simulations by Markov Chain Monte Carlo Methods. …”
    Get full text
    Get full text
    Article