Search Results - (( basic relationship based algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy by Qing, Zhang, Abdullah, Abdul Rashid, Choo, Wei Chong, Ali, Mass Hareeza

    Published 2022
    “…This study uses the genetic algorithm radial basis, neural network model, to make judgments on the relationships contained in this sequence and compare and analyze the prediction effect and generalization ability of the model to verify the applicability of the genetic algorithm radial basis, neural network model, based on the modeling of historical data, which may contain linear and nonlinear relationships by itself, so this study uses the genetic algorithm radial basis, neural network model, to make, compare, and analyze judgments on the relationships contained in this sequence.…”
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Memory-based Immune Network for Multi-Robot Cooperation by Razali, Sazalinsyah, Meng, Qinggang, Yang, Shuang-Hua

    Published 2009
    “…Our proposed algorithm is based on immune network theories that have many similarities with the multi-robot systems domain. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Interval-valued fuzzy soft topology and its applications in group decision-making problems by Altwer, Mabruka Ali Juma

    Published 2022
    “…This generalization shows a deeper insight into the decision-making processed based on preference relationship. In this thesis, we develop two multi algorithms based on the interval-valued fuzzy soft topology to overcome different situations in decision-making problems. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Multi-Robot Cooperation using Immune Network with Memory by Razali, Sazalinsyah, Meng, Qinggang, Yang, Shuang-Hua

    Published 2009
    “…Our proposed algorithm is based on immune network theories that have many similarities with the multi-robot systems domain. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Development of rule-based advisory system from modified hazard and operability study on fatty acid fractionation column by M. Yunus, M. Y., Ali, Mohamad Wijayanuddin, Kamsah, Mohd. Zaki

    Published 2003
    “…Microsoft AccessTM and Visual BasicTM have been used to develop the knowledge-based and the inference engine respectively. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Vision Based Calibration and Localization Technique for Video Sensor Networks by Mohamed Sharif, Sharif Amar Mohamed Sharif

    Published 2009
    “…Very few of these localization algorithms use vision based technique. In this work, a vision based technique is proposed for localizing and configuring the camera nodes in video wireless sensor networks. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…Generally, most of the algorithmic models were generated based on historical projects, and therefore, the same methodology has been applied in this research work. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Association ruleset formulation for cyberattack attribution process in cyber threat intelligence using apriori algorithm by Abu, Md Sahrom

    Published 2021
    “…The results showed that CTI-AR effectively identify the attributes, relationship between attributes and attribution level group of cyberattack in CTI. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Neural Network – A Black Box Model by Kuok, Kuok King, Chan, Chiu Po, Md. Rezaur, Rahman, Khairul Anwar, Mohamad Said, Chin Mei, Yun

    Published 2024
    “…A variety of metaheuristic algorithms have been used to train ANN, including Genetic Algorithms (GA), Particle Swarm Optimization (PSO), Simulated Annealing (SA), Ant Colony Optimization (ACO), Tabu Search (TS), and Harmony Search (HS). …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  20. 20

    A Refined Immune Systems Inspired Model for Multi-Robot Shepherding by Razali, Sazalinsyah, Meng, Qinggang, Yang, Shuang-Hua

    Published 2010
    “…The proposed algorithm is based on immune network theories that have many similarities with the multi-robot systems domain. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item