Search Results - (( using reflective path algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Self-similar network traffic using Successive Random Addition (SRA) algorithm / Hani Hamira Harun by Harun, Hani Hamira

    Published 2006
    “…In this project, we have used the Successive random algorithm (SRA). Then, we have decided to use Variance time plot and R/S statistics as our statistical analysis tools. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Comparison between Levenberg-Marquardt and scaled conjugate gradient training algorithms for ionosphere condition using Multilayer Perceptrons / Mohd Sharif Ibrahim by Ibrahim, Mohd Sharif

    Published 2010
    “…This paper described the examinations of two training algorithms which are Levenberg-Marquardt (LM) and Scaled Conjugate Gradient (SCG) of Multilayer Perceptrons (MLPs) using MATLAB R2009a. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Suicide and self-harm prediction based on social media data using machine learning algorithms by Abdulrazak Yahya, Saleh, Fadzlyn Nasrini, Mostapa

    Published 2023
    “…In combined with robust machine learning algorithms, social networking data may provide a potential path ahead. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Optimization Method Using Modified Harmony Search For Coverage And Energy Efficiency In Wireless Sensor Network by Halim, Nurul Hamimi

    Published 2018
    “…However,the sink node position and size of data transmitted will not affect the performance of coverage area.This is because the coverage area value is fluctuated as the parameters value increases.Throughout the experiment conducted,sensor nodes deployed using Modified Harmony Search algorithm (MHS) gives better coverage area compared to other existing methods.The average coverage area percentage obtained by Modified Harmony Search is 63 %.The average coverage area percentage obtained by Modified Random is 48 % and the average coverage area percentage obtained by Harmony Search is 46 %.The highest coverage area recorded for Modified Harmony Search is 70 %.To enhance the energy efficiency,shortest path distance finder is added to each method.Throughout the research,Modified Harmony Search with shortest path distance finder gives optimum results.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Automatic extraction of digital terrain model and Building Footprint from airborne LiDAR data using rule-based learning techniques by Jifroudi, Hamidreza Maskani

    Published 2021
    “…In the next step, after taking the filtering steps, the Buildings Footprint was created and was saved as a vector file in the output path by keeping the first reflectance, filtering the nearest neighbor, filtering based on intensity, creating a new network, applying the height filter, filtering based on a closed range, applying the size filter, creating the initial boundary, performing noise removal at the boundary, correcting boundary fluctuations, and finally using the decision tree. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid Balance Artificial Potential Field Navigation System For An Autonomous Surface Vessel In Riverine Environment by Jianhong, Mei

    Published 2019
    “…There are two issues related to ASV autonomous riverine navigation; river environment modelling and autonomous path planning and obstacles avoidance. Thus, the objectives of the research are: to develop a riverbanks identification algorithm for ASV navigation; and to develop a marine traffic rules compliant navigation and obstacles avoidance algorithm for ASV in the unstructured riverine environment. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Real-time interpolator of CNC parametric curves with chord-error and feed-rateconstraints by Wan Ruslan, W. Yusoff, Fadhlur Rahman, Mohd Romlay, Ismayuzri, Ishak

    Published 2025
    “…The chord-error constraints comprise geometric and kinematic properties of different parametric curves, coveringbends and sharp turns. The resulting algorithm was executed both in real-time, online mode by driving the CNC machine directly, and in an offline mode by using a stored RS274/NGC G-code file. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Fingerprint frontier: the evolution of biometric security by Khalifa, Othman Omran

    Published 2023
    “…Chapter two provides a detailed lens into the core mechanics, followed by an exploration of the algorithms that drive the matching processes in Chapter Three. …”
    Get full text
    Get full text
    Get full text
    Book
  17. 17

    Performance evaluation of ultrasonic assisted wire electrical discharge turning for TI-6AL-4V material by Mohd Zakaria, Muhammad Akmal

    Published 2023
    “…The electrode wire debris generated during machining, which can resolidify to the machined surface, is able to be reduced with the integration of ultrasonic vibration to WEDT machining when using low ultrasonic amplitude (10 μm). After performing with multi-objective parameter optimization with the goal of maximising the MRR and minimising the surface roughness using genetic algorithm method, there is a 5.2% improvement for the MRR and 11.6%–27.9% improvement for surface roughness compared to conventional WEDT. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Regional travel-time residual studies and station correction from 1-D velocity models for some stations around Peninsular Malaysia and Singapore by Osagie, Abel U., Mohd. Nawawi, Mohd. Nawawi, Khalil, Amin Esmail, Abdullah, Khiruddin

    Published 2017
    “…Travel-times were calculated using three 1-D models (Preliminary Ref. Earth Model PREM (Dziewonski and Anderson, 1981, IASP91, and Lienert et al., 1986) and an adopted two-point ray tracing algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Channel Modeling and Direction-of-Arrival Estimation in Mobile Multiple-Antenna Communication Systems by Ravari, Arastoo Rostami

    Published 2005
    “…Our proposed channel model is able to produce fading signal waveform which agrees with the results of reflected angular power dispersions measured in the field, e.g. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Keyword query processing interface model of ontological natural language manipulation by Hasany, Syed Muhammad Noman

    Published 2010
    “…We preprocessed the RDF graph to be stored in distributed manner after the elimination of single chain productions in order to increase the efficiency in conversion process. We used the shortest path algorithms to be called on certain resources to explore connectivity to reduce complexity of search. …”
    Get full text
    Get full text
    Thesis