Search Results - (( java application mining algorithm ) OR ( parameter solution window algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1
  2. 2
  3. 3

    Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi by Seyedmehdi, Mirmohammadsadeghi

    Published 2015
    “…The initial feasible solutions have been generated for this purpose. The solutions have been significantly improved by the algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Taguchi-Grey Relational Analysis Method for Parameter Tuning of Multi-objective Pareto Ant Colony System Algorithm by Muthana, Shatha Abdulhadi, Ku Mahamud, Ku Ruhana

    Published 2023
    “…This research aims to find the optimal parameter values for the Pareto Ant Colony System (PACS) algorithm, which is used to obtain solutions for the generator maintenance scheduling problem. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8

    Memetic Heuristic Approach for Solving Truck and Trailer Routing Problems with Stochastic Demands and Time Windows by Mirmohammadsadeghi, S., Ahmed, S.

    Published 2015
    “…The results can be compared with the VRPSDTW (vehicle routing problem with stochastic demands (VRSPD) with time windows) solution obtained using large neighbourhood search (LNS) of earlier research. …”
    Get full text
    Article
  9. 9
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Quality Of Service Provisioning Scheme For Real-Time Applications in IEEE 802.11 Wireless Local Area Network by Ng, Roger Cheng Yong

    Published 2006
    “…SNT-AC uses an admission control algorithm to restrict flows in and out of the BSS. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Distributed joint power control, beamforming and spectrum leasing for cognitive two-way relay networks by Iranpanah, Havzhin

    Published 2017
    “…Once the number of iterations conditioning along each dimension corresponds with the length of price interval, the convergence of algorithm is achieved. A key factor in the accuracy of Dynamic Response Pricing (DRP), the length of the demand response window, as observed in numerical results, indicates that the convergence of DRP to optimal threshold pricing is completed with a 98 percent accuracy in a 15 time-unit demand response. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Analysis and decentralised optimal flow control of heterogeneous computer communication network models by Ku-Mahamud, Ku Ruhana

    Published 1993
    “…A new method of general model reduction using the Norton' s theorem for general queueing networks in conjunction with the universal maximum entropy algorithm is proposed for the analysis of xix large general closed queueing networks. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis