Search Results - (( basic data normalization algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Improved normalization and standardization techniques for higher purity in K-means clustering by Dalatu, Paul Inuwa, Fitrianto, Anwar, Mustapha, Aida

    Published 2016
    “…Clustering is basically one of the major sources of primary data mining tools, which make researchers understand the natural grouping of attributes in datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…By extracting various plots from different aspects, we demonstrated that, compared to the basic algorithm, our algorithm has higher reliability and availability as the quantity of the input data increases. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Performance enhancement of adaptive cluster formation and routing protocols in wireless networks by Khalaf, Osamah Ibrahem

    Published 2017
    “…This thesis describes an analysis on the effect of these challenges on the perceived video quality over MANET which is considered the important network in many studies. An enhanced algorithm has been suggested to improve the video quality using routing algorithm which is used to transfer the data packets with minimum number of errors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…The basic statistical frequency method was used to analyse the performance result. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Dynamic traffic light flow control system using on-road sensor technology / Mohamed Irfan by Mohamed , Irfan

    Published 2017
    “…The controller uses Traffic Light Signal Manipulation Algorithm (TLSMA) to dynamically change in the traffic signals by using the data generated by the sensors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    A Review on the Development of Indonesian Sign Language Recognition System by Jasni, Mohamad Zain, Sutarman, na, Mazlina, Abdul Majid

    Published 2013
    “…However, communication with normal people is a major handicap for them since normal people do not understand their sign language. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Machine learning as new approach for predicting of maxillary sinus volume, a sexual dimorphic study by Hamd, Zuhal Y., Aljuaid, Hanan, Alorainy, Amal I., Osman, Eyas G., Abuzaid, Mohamed, Elshami, Wiam, Elhussein, Nagwan, Gareeballah, Awadia, Pathan, Refat Khan, Naseer, K.A., Khandaker, Mayeen Uddin *, Ahmed, Wegdan

    Published 2023
    “…In this retrospective study, we used data from 150 patients with normal maxillary sinuses to train and evaluate a Python ML algorithm for its ability to predict MSV from basic patient demographics (age, gender) and sinus length measurements in three directions (anteroposterior, mediolateral, and superoinferior). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Robust Kernel Density Function Estimation by Dadkhah, Kourosh

    Published 2010
    “…The results of the study indicate that the proposed methods are capable of labelling normal observation and potential outliers in a data set. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Extention and cryptanalysis of golden cryptography by Sharabyan, Mohammad Tahghighi

    Published 2015
    “…On the other hand, the encryption algorithm of GC is more suitable for textual data and cannot be directly applied to images. …”
    Get full text
    Get full text
    Thesis