Search Results - (( java application mining algorithm ) OR ( data alleviation based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection by Tubishat, Mohammad, Idris, Norisma, Shuib, Liyana, Abushariah, Mohammad A.M., Mirjalili, Seyedali

    Published 2020
    “…Many fields such as data science, data mining suffered from the rapid growth of data volume and high data dimensionality. …”
    Get full text
    Get full text
    Article
  10. 10

    An enhanced feed-forward neural networks and a rule-based algorithm for predictive modelling of students' academic performance by Raheem, Ajiboye Adeleke

    Published 2016
    “…Also, for a more efficient exploration of students‟ data collected for this research, a Rule-Based Algorithm is proposed and implemented. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A comparative review on symmetric and asymmetric dna-based cryptography by Hammad B.T., Sagheer A.M., Ahmed I.T., Jamil N.

    Published 2023
    “…As observed, the computational time of RSA algorithm combined with DNA coding was longer. In order to alleviate this problem, data redundancy was reduced by activating the GZIP compressed algorithm. …”
    Article
  12. 12

    Content-based recommender system for an academic social network / Vala Ali Rohani by Vala Ali, Rohani

    Published 2014
    “…In this study, a new algorithm is proposed to represent an enhanced version of content-based recommender systems by utilizing social networking features. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Landslide susceptibility mapping: machine and ensemble learning based on remote sensing big data by Kalantar, Bahareh, Ueda, Naonori, Saeidi, Vahideh, Ahmadi, Kourosh, Abdul Halin, Alfian, Shabani, Farzin

    Published 2020
    “…Next, an ensemble model consisting of all four algorithms is implemented to examine possible performance improvements. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A proactive energy awareness traffic routing for wireless sensor networks against energy sink-holes by Mustafa, Mayada Salih Abdalla

    Published 2019
    “…Next, the problem of large variations in energy consumptions with multiple sinks in merging tree-based multiple energy hole alleviation algorithm (MEHA-MT) is addressed. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Cache replacement algorithm using hierarchical allocation scheduling by Mohd Sharif, Mohammad Faizal

    Published 2014
    “…The existing cache replacement (i.e. least recently used (LRU)) algorithm depends on usage of the data being referenced. …”
    Get full text
    Get full text
    Thesis
  17. 17

    ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs by Khan, T., Singh, K., Hasan, M.H., Ahmad, K., Reddy, G.T., Mohan, S., Ahmadian, A.

    Published 2021
    “…The paper presents a well-organized trust estimation-based routing scheme (ETERS) that consists multi-trust (communication trust, energy trust, data trust) approach to alleviate several internal attacks like badmouthing, Sybil, selective forwarding, onâ��off,â�� black hole, and gray-hole attacks for clustered WSN. …”
    Get full text
    Get full text
    Article
  18. 18

    Development of hierarchical analytical scheduling (HAS) - a conceptual framework. by Harun, Harlisya, Mohd. Sharif, M. F., Mariun, N., Chulan, Ungku, Khazani, Khamizon

    Published 2012
    “…The model works by determining the relative importance of data during cache replacement policy. HAS is based on the concept of hierarchical temporal memory (HTM), in which the scheduling is derived on the priority and similarity of data from the aspect of space and time. …”
    Get full text
    Conference or Workshop Item
  19. 19

    Parameter estimation of multicomponent transient signals using deconvolution and ARMA modelling techniques by Salami, Momoh Jimoh Emiyoka, Sidek, Shahrul Na'im

    Published 2003
    “…The frequency domain method of analysis that involves Gardner transformation and conventional inverse filtering often degrades the quality of deconvolved data, leading to inaccurate results, especially for noisy data. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Secure lightweight client for cloud-based E-Health Model by Zhang, Xiaowei

    Published 2023
    “…This algorithm verifies the identity and permission of non-group members to meet the strict privacy protection requirements of EHRs data. …”
    Get full text
    Get full text
    Get full text
    Thesis