Search Results - (( java application mining algorithm ) OR ( linear generation based algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Efficient dynamic DNA-based block cipher algorithm by Chng, Chern Wei

    Published 2023
    “…The proposed method involves utilising DNA-based components consisting of the nucleotides {A, T, G, C} to generate a novel Dynamic DNA-based S-Box. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A self-tuning filter-based adaptive linear neuron approach for operation of three-level inverter-based shunt active power filters under non-ideal source voltage conditions by Yap, Hoon, Mohd Radzi, Mohd Amran, Hassan, Mohd Khair, Mailah, Nashiren Farzilah

    Published 2017
    “…Additionally, the proposed STF-based ADALINE algorithm implements the modified Widrow-Hoff (W-H) weight updating algorithm for fast generation of reference current. …”
    Get full text
    Get full text
    Article
  6. 6

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    An Improved Linear Feedback Shift Register (LFSR- based) Stream Cipher Generator by Mahdi, Reyadh H

    Published 2009
    “…Linear feedback shift register ( LFSR-based) stream cipher an improved design for a random key generator in a stream cipher algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Optimizing S-box generation based on the Adaptive Agent Heroes and Cowards Algorithm by Kamal Z., Zamli

    Published 2021
    “…This paper introduces a new variant of a metaheuristic algorithm based on Agent Heroes and Cowards Algorithm (AHC), called Adaptive Agent Heroes and Cowards Algorithm (AAHC). …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Sustainable energy management: Artificial intelligence-based electricity consumption prediction in limited dataset environment for industry applications by Chuan, Zun Liang, Tan, Lit Ken, Wee, Angel Chi Chyin, Yim Hin, Tham, Shao, Jie Ong, Jia, Yi Low, Chong, Yeh Sai

    Published 2024
    “…This study aimed to develop a modified stacked ensemble multivariable Artificial Intelligence (AI)-based predictive algorithm, specifically Stacked Simple Linear Regression and Multiple Linear Regression (SLR-MLR), and Stacked Simple Linear Regression and Multiple Non-Linear Regression (SLR-MNLR) utilizing the Cross Industry Standard Process for Data Mining (CRISP-DM) data science methodology. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Economic dispatch with piecewise linear function and line loss / Amir Ashraf Mohd Johari by Mohd Johari, Amir Ashraf

    Published 2014
    “…A system of three generation units are tested with developed algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System by Hormozi, Shahram Golzari

    Published 2011
    “…Firstly, exponential-based resource allocation methods are utilized instead of the existing linear resource allocation method. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Thermoelectric cooler identification based on continuous-time hammerstein model using metaheuristics algorithm by Jui, Julakha Jahan, Mohd Ashraf, Ahmad, Mohamed Sultan, Mohamed Ali, Mohd Anwar, Zawawi, Mohd Falfazli, Mat Jusof

    Published 2021
    “…Efficiency of the hMVOSCA algorithm also evaluated based on the convergence curve, bode plot of the linear subsystem, function plot of the nonlinear subsystem, and statistical performance value. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Selective chaotic maps Tiki-Taka algorithm for the S-box generation and optimization by Kamal Z., Zamli, Abdul Kader, ., Fakhrud Din, ., Alhadawi, Hussam S.

    Published 2021
    “…To address the nonlinear requirement of cryptography (i.e., ensuring the generated S-box is sufficiently robust against linear and differential cryptanalysis attacks), many chaos-based metaheuristic algorithms have been developed in the literature. …”
    Get full text
    Get full text
    Get full text
    Article