Search Results - (( java application mining algorithm ) OR ( using active ((_ algorithm) OR (based algorithm)) ))

Refine Results
  1. 1

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Clustering chemical data set using particle swarm optimization based algorithm by Triyono, Triyono

    Published 2008
    “…In this study, Particle Swarm Optimization (PSO) based clustering algorithm is exploited to optimize the results of other clustering algorithm such as K-means. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Hybrid anti-islanding algorithm for utility interconnection of distributed generation by Abdolrasol, M.G.M., Mekhilef, Saad

    Published 2009
    “…This algorithm is based on two detection schemes; namely active and passive. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    Integration of dual intelligent algorithms in shunt active power filter by Abdul Rahman, Nor Farahaida, Mohd Radzi, Mohd Amran, Mariun, Norman, Che Soh, Azura, Abd Rahim, Nasrudin

    Published 2013
    “…This paper presents an integration of dual intelligent algorithms: artificial neural network (ANN) based fundamental component extraction algorithm and fuzzy logic based DC-link voltage self-charging algorithm (fuzzy self-charging algorithm), in a three-phase three-wire shunt active power filter (SAPF). …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Activity recognition using one-versus-all strategy with relief-f and self-adaptive algorithm by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran

    Published 2018
    “…Many researchers dealing with smartphone sensors to recognize human activities using machine learning algorithms. In this paper, we proposed One-versus-All (OVA) strategy with relief-f and self-adaptive algorithm to recognize these activities. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Enhancing Wearable-Based Human Activity Recognition with Binary Nature-Inspired Optimization Algorithms for Feature Selection by Norfadzlan, Yusup, Izzatul Nabila, Sarbini, Dayang Nurfatimah, Awang Iskandar, Azlan, Mohd Zain, Didik Dwi, Prasetya

    Published 2026
    “…The experiment results show how these algorithms could be used to improve methods for recognizing human activities using wearables technology, such as feature selection, parameter adjustment, and model optimization.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Active intelligent control of vibration of flexible plate structures by Md Salleh, Salihatun

    Published 2011
    “…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
    Get full text
    Get full text
    Thesis
  12. 12

    Developing A Control Protocol Algorithm For Stimulating The Street Light System by Wong, Kwo Yiang

    Published 2017
    “…The final prototype is developed by using the control protocol algorithm to activate the system and control all the street lights simultaneously based on the presence of objects. …”
    Get full text
    Get full text
    Monograph
  13. 13

    A self-tuning filter-based adaptive linear neuron approach for operation of three-level inverter-based shunt active power filters under non-ideal source voltage conditions by Yap, Hoon, Mohd Radzi, Mohd Amran, Hassan, Mohd Khair, Mailah, Nashiren Farzilah

    Published 2017
    “…Additionally, the proposed STF-based ADALINE algorithm implements the modified Widrow-Hoff (W-H) weight updating algorithm for fast generation of reference current. …”
    Get full text
    Get full text
    Article
  14. 14

    The swarm-based exploration algorithm with expanded circle pattern for searching activities by Zuhri, Muhammad Fuad Reza, Zahari, Ammar, Desia, Recky, Ismail , Amelia Ritahani, Al Haek, Mohammed

    Published 2015
    “…In this paper, we propose an exploration algorithm using quadcopter in simulation to discover an unknown area that is based on the expanding circle pattern for searching activities. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…Subsequently, the THF modelling scheme can be incorporated into an established real time NLFXLMS algorithm termed THF-NLFXLMS algorithm. The developed THF-NLFXLMS algorithm is tested by means of simulation and implemented experimentally using FPGA-based real time controller for a nonlinear ANC application. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…Therefore, cyberbullying detection using a Machine Learning approach is suggested. This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18
  19. 19

    Active power optimization based on non adaptive immune algorithm: article by Md. Saleh, Nurhayati, Musirin, Ismail

    Published 2010
    “…This paper presents a study of active power optimization based on non adaptive immune algorithm (NAIA) in power systems. …”
    Get full text
    Get full text
    Article
  20. 20

    Enhanced control algorithms for multilevel inverter-based shunt active power filter by Hoon, Yap

    Published 2017
    “…Finally, mitigation performance of the three-level NPC inverter-based SAPF while using all the proposed control algorithms simultaneously (Set 3) is observed to be the best.…”
    Get full text
    Get full text
    Get full text
    Thesis