Search Results - (( same location based algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Harmony search algorithm for curriculum-based course timetabling problem by Wahid, Juliana, Mohd Hussin, Naimah

    Published 2013
    “…With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Harmony search algorithm for curriculum-based course timetabling problem by Wahid, Juliana, Mohd Hussin, Naimah

    Published 2013
    “…However, the algorithm produced results that were not comparatively better than those previously known as best solution.With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Optimization of image mapping & camera coverage efficiency for continuous location and tracking by Avinash A.R., Chandan K.C.

    Published 2023
    “…The Vision Based location and tracking is a vastly escalating technology mainly used to monitor various environments. …”
    Conference paper
  12. 12

    Design of wavelet neural networks based on symmetry fuzzy C-means for function approximation by Zainuddin, Zarita, Pauline, Ong

    Published 2013
    “…In this paper, an enhanced fuzzy C-means algorithm, specifically the modified point symmetry–based fuzzy C-means algorithm (MPSDFCM), was proposed, in order to determine the optimal initial locations for the translation vectors. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Wifi fingerprinting indoor positioning with multiple access points in a single base station using probabilistic method by Mazlan, M.A.A.A., Khir, M.H.M., Saad, N.M., Dass, S.C.

    Published 2017
    “…Based on experimental results, the proposed multiple APs in a single base station was found to reduce the number of base stations required to achieve the same or better accuracy as existing approach using the same number of APs. …”
    Get full text
    Get full text
    Article
  14. 14

    Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks by Mahzan, Shahruddin, J. Staszewski, Wieslaw, Worden, Keith

    Published 2010
    “…This paper compares two advanced signal processing methods for impact location in composite aircraft structures. The first method is based on a modified triangulation procedure and Genetic Algorithms whereas the second technique applies Artificial Neural Networks. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Balancing exploration and exploitation in ACS algorithms for data clustering by Jabbar, Ayad Mohammed, Sagban, Rafid, Ku-Mahamud, Ku Ruhana

    Published 2019
    “…The ACOC performs clustering based on random initial centroids, which are generated iteratively during the algorithm run. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Privacy-aware personal navigation services / Melissa Shahrom by Shahrom, Melissa

    Published 2013
    “…Therefore, protecting the confidentiality of location privacy is extremely vital. This innovation produces an algorithm that is able to protect location privacy and at the same time generate robust navigation instructions without depending on precise location information. …”
    Get full text
    Get full text
    Book Section
  17. 17

    WIFI FINGERPRINTING INDOOR POSITIONING WITH MULTIPLE ACCESS-POINTS IN A SINGLE BASE STATION USING PROBABILISTIC METHOD by BIN MAZLAN, MUHAMMAD AL AMIN AMALI

    Published 2017
    “…Based on experimental results, the proposed multiple APs in a single base station was found to reduce the number of base stations required to achieve the same or better accuracy as existing approach using the same number of APs. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol by Sjaugi, Muhammad Farhan

    Published 2008
    “…The proposed algorithms based on node location information that may be collected through Global Positioning System (GPS). …”
    Get full text
    Get full text
    Thesis
  19. 19

    Replica Creation Algorithm for Data Grids by Madi, Mohammed Kamel

    Published 2012
    “…This research contributes replication strategies embodied in one algorithm that enhances data grid performance, capable of making a decision on creating or deleting more than one file during same decision. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Solving vehicle routing problem by using improved K-nearest neighbor algorithm for best solution by Mohammed, Mazin Abed, Abd Ghani, Mohd Khanapi, Hamed, Raed Ibraheem, A. Mostafa, Salama, Ahmed Ibrahim, Dheyaa, Jameel, Humam Khaled, Alallah, Ahmed Hamed

    Published 2017
    “…Approach: The approach has been presented based on two phases: firstly, the algorithms have been adapted to solve the research problem, where its procedure is different than the common algorithm. …”
    Get full text
    Get full text
    Get full text
    Article