Search Results - (( java application mining algorithm ) OR ( parallel deviation based algorithm ))

  • Showing 1 - 14 results of 14
Refine Results
  1. 1
  2. 2

    PID Parameters Improvement for AGC in Three Parallel-Connected Power Systems by Mushtaq, Najeeb, Ramdan, Razali, K. G., Mohammed, Hamdan, Daniyal, Ali, M. Humada

    Published 2016
    “…Based on the simulated results, MS_ISE has better settling time, lesser peak time, and lower maximum deviation as compared with GA_ISE. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3
  4. 4
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9
  10. 10

    Development of a parallel clustering of bilingual corpora based on reduced terms by Leow, Ching Leong

    Published 2015
    “…A set of relevant terms will be selected based on the GA based terms selection process. The parallel mapping percentages show an improvement when the number of terms reduced using the GA with different mutation rate.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    A PI based coordinated maximum power point tracking controller for grid connected photovoltaic system / Md Haidar Islam by Md Haidar, Islam

    Published 2021
    “…The differences between conventional and other modified MPPT algorithms are explained in this research work. A new coordinated PI-MPPT algorithm is then proposed based on the deficiencies of the other algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Improved criteria determination of an automated negative lightning return strokes characterisation using Brute-Force search algorithm by Abdul Haris, Faranadia

    Published 2021
    “…The criteria for each of the negative lightning return strokes parameters were established and defined based on specific mathematical equations. Accordingly, the proposed Brute-Force search algorithm characterised the negative lightning return strokes parameters based on the seven parameters. …”
    Get full text
    Get full text
    Thesis