Search Results - (( java application mining algorithm ) OR ( data deviation between algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Hazard identification on fractionation column using rule based expert system by Mohd Yunus, Mohd Yusri, Ali, Mohamad Wijayanuddin

    Published 2001
    “…The study has contributed to an improvement of hazard identification technique and proposed an algorithm by considering the whole consequences of process deviation in each stream. …”
    Get full text
    Get full text
    Article
  8. 8

    A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2018
    “…The purpose of this study is to observe the reliability of genetic algorithm in our previously simulated network optimization in a data centre. …”
    Get full text
    Get full text
    Article
  9. 9

    A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2018
    “…The purpose of this study is to observe the reliability of genetic algorithm in our previously simulated network optimization in a data centre. …”
    Get full text
    Get full text
    Article
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Neural Network Model and Finite Element Simulation of Spring back in Plane-Strain Metallic Beam Bending by Abu Khadra, Fayiz Y. M.

    Published 2006
    “…The standard deviation between the finite element method and the neural network metamodels for the two functions are 0.635 degree and 0.985 mm respectively. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Ensemble divide and conquer approach to solve the rating scores’ deviation in recommendation system by Al-Hadi, Ismail Ahmed Al-Qasem, Mohd Sharef, Nurfadhlina, Sulaiman, Md Nasir, Mustapha, Norwati

    Published 2016
    “…Therefore, this paper proposes Ensemble Divide and Conquer (EDC) approach for solving 2 main problems which are the data sparsity and the rating scores’ deviation (misplace). …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. Clustering technique basically utilizes distance measure to define distance between various data points. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Three-dimension coronary artery tree curvature confirmation by Khaleel, Hasan Hadi, O. K. Rahmat, Rahmita Wirza, Dimon, Mohd Zamrin, Mahmod, Ramlan, Mustapha, Norwati

    Published 2010
    “…The standard approach was published in 1998 as a study comparing certain 3D curvature measurement algorithms. Approach: Our approach consists of three major steps: (1) Apply the paraboloid fitting technique from the standard approach; (2) Apply the 3D reconstruction algorithm proposed in this research on the same data in step (1) and (3) Apply the Standard Deviation technique on both outputs from (1) and (2) and compare the outputs. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Identification of continuous-time hammerstein model using improved archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad, Cho, Bo Wen

    Published 2024
    “…This proposed algorithm also discerned linear and nonlinear subsystem variables within a continuous-time Hammerstein model utilizing input and output data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    The Development of an Algorithm to Determine Axial Capacity of Piles from SPT N-Values by Ambrose, Jasmin

    Published 2000
    “…The comparison between measured and predicted capacities was conducted using standard deviation values to determine the amount of error in the prediction. …”
    Get full text
    Get full text
    Thesis
  19. 19

    New heuristic function in ant colony system for the travelling salesman problem by Alobaedy, Mustafa Muwafak, Ku-Mahamud, Ku Ruhana

    Published 2012
    “…Experiments conducted have used eight data sets from TSPLIB with different numbers of cities.The proposed algorithm shows promising results when compared to classical ACS in term of best, average, and standard deviation of the best tour length.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Automated negative lightning return strokes characterization using brute-force search algorithm by Abdul Haris, Faranadia, Ab. Kadir, Mohd Zainal Abidin, Sudin, Sukhairi, Jasni, Jasronita, Johari, Dalina, Zaini, Nur Hazirah

    Published 2022
    “…The statistical analysis showed a good agreement between the manual and automated data with a percentage difference of 1.19% to 4.82%. …”
    Get full text
    Get full text
    Get full text
    Article