Search Results - (( java applications mining algorithm ) OR ( parameter estimation security algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    ADAPTIVE LINEAR ALGORITHMS FOR POWER SYSTEM FUNDAMENTAL AND HARMONIC ESTIMATION by MUBARAK MOHMMED, HUSSAM ALHAJ

    Published 2015
    “…Frequency and harmonics are two essential parameters for power system functions such as power quality monitoring, power system protection, economic dispatch and security assessment. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Power System State Estimation In Large-Scale Networks by NURSYARIZAL MOHD NOR, NURSYARIZAL

    Published 2010
    “…The developed program is suitable either to estimate the UPFC controller parameters or to estimate these parameter values in order to achieve the given control specifications in addition to the power system state variables.…”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The research starts with developing the hybrid deep learning model consisting of DNN and a K-Means Clustering Algorithm. Then, the developed algorithm is implemented to estimate the parameters of the Lorenz system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Identifying high influence parameters using Genetic Algorithm (GA) chromosomes for water consumption by Siti Arpah, Ahmad, Nurul Nadia Hani, ., Ahmad Firdaus, Ahmad Fadzil, Nor Elaiza, Abd Khalid, Rosanita, Adnan, Khairul Anwar, Rasmani, Wan Isni Sofiah, Wan Din

    Published 2021
    “…This work utilized Genetic Algorithm (GA) to optimize the coefficient of micro-components of water consumption (CMWC) values to determine high influential household routine parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  12. 12

    A hybrid algorithm of source localization based on hyperbolic technique in WSN by Kabir, H., Kanesan, J., Reza, A.W., Ramiah, H.

    Published 2014
    “…In this paper, a hybrid method combined with maximum likelihood (ML) and genetic algorithm (GA) are proposed to determine the instantaneous position of the moving source by estimating the position and velocity based on hyperbolic techniques (TDOA and FDOA). …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…We also evaluate the memory cost for system parameters and accumulators. Finally, we study the provable security element for both cryptosystems. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Estimation of Examinees' Ability Through Computer Adaptive Testing Based on Neural Network Approach by Kazemi, Azam

    Published 2010
    “…In the second phase, estimation of examinees’ ability has been obtained with multi-layer feed forward neural network with back propagation algorithm. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…It can be concluded that the modified algorithm decreases the biases, the variances and the mean squared errors of the LTS estimators. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Effects of Ambient Tropospheric Ozone on Mr-219 Rice in the Muda Irrigation Scheme Area by Ismail, Marzuki

    Published 2005
    “…This study finding is undeniable imperative and it bestows the first algorithmic yield-loss model of crop to ozone in this country, ever.…”
    Get full text
    Get full text
    Thesis