Search Results - (( affecting implementation some algorithm ) OR ( java application mining algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE by BORETSKAYA, VIKTORIYA

    Published 2013
    “…In some European countries skin diseases affect around 60 percent of the population [15]. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Attribute related methods for improvement of ID3 Algorithm in classification of data: A review by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2020
    “…Nevertheless, there are some limitations in ID3 algorithm that can affect the performance in the classification of data. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Outdoor marker-less tracking and pose calculating system for mobile augmented reality by Rehman, Ullah Khan

    Published 2014
    “…While some adopt client server architecture for marker-less tracking which is adversely affected by network latency. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Amplitude independent muscle activity detection algorithm of soft robotic glove system for hemiparesis stroke patients using single sEMG channel by Hameed, Husamuldeen Khalid

    Published 2020
    “…To simplify soft robotic glove systems and make them more practical for use in daily basis, they should have minimum number of sEMG channels. In spite of some algorithms that have been developed in the literature to classify some hand motions by using single channel, the current implementation of soft robotic glove systems are still employing two channels for detecting the closing and opening movements of the hand, due to the intensive calculations required by these algorithms which impose difficulties on real time implementation. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Token based path allocation approach for mobile robots in sorting centre for achieving high throughput by Khoo, Zong Zheng

    Published 2024
    “…This project proposes an improved path-finding algorithm that implements token-based path finding while a robot wants to access a grid cell. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  13. 13

    Development of heuristic task scheduling algorithm in cloud computing by Diallo, Laouratou, Hassan Abdalla Hashim, Aisha, Olanrewaju, Rashidah Funke

    Published 2016
    “…The proposed algorithm is followed by a discussion in order to make smoother the implementation. …”
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Architectural review of load balancing single system image by Ahmed, Bestoun S., Samsudin, Khairulmizam, Ramli, Abdul Rahman

    Published 2008
    “…Result: This study will review some of the most popular architecture and algorithms used in load balancing single system image. …”
    Get full text
    Get full text
    Article
  15. 15

    A semi-synchronous label propagation algorithm with constraints for community detection in complex networks by Chin, J.H., Ratnavelu, K.

    Published 2017
    “…Despite this advantage in computational time, the performance of LPA is affected by randomness in the algorithm. A modified LPA, called CLPA-GNR, was proposed recently and it succeeded in handling the randomness issues in the LPA. …”
    Get full text
    Get full text
    Article
  16. 16

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…Those two algorithms are combined together due to the strong possibilities of being unable to achieve the optimal results when implemented separately. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Improved flower pollination optimization algorithm based on swap operator and dynamic switch probability selection by Iqbal, Muhammad

    Published 2023
    “…These algorithms belong to stochastic and nondeterministic classes, have some problems with exploration or exploitation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    The effect of job satisfaction on the relationship between organizational culture and organizational performance by Imran, Muhammad

    Published 2023
    “…These algorithms belong to stochastic and nondeterministic classes, have some problems with exploration or exploitation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A secure, anonymous and verifiable E-Voting system by Ooi, Elynn

    Published 2020
    “…Furthermore, this paper also proposes a more secure voting system which uses some encryption and hashing algorithms in order to solve the negative impacts of the existing voting systems. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Dynamic key scheduling algorithm for block ciphers using quasigroup string transformation by Hassan Disina, Abdulkadir

    Published 2018
    “…Similarly, the key space should be disproportionately large to resist any attack on the secret key. To archive that, some algorithms adopt the use of matrixes such as quasigroup, Hybrid cubes and substitution box (S-box) to generate the encryption keys. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis