Search Results - (( basic visualization mining algorithm ) OR ( things application using algorithm ))
Search alternatives:
- visualization mining »
- basic visualization »
- things application »
- mining algorithm »
- using algorithm »
-
1
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
2
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
3
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014“…This project proposed a data mining technique called Association Rule Mining. Basically Association Rule Mining is to investigate the rules according to the predefined parameter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Intelligent Multi-cellular Network Connectivity for Internet of Things Applications
Published 2023Conference Paper -
5
-
6
Security factors based evaluation of verification algorithm for an IoT access system
Published 2023Conference Paper -
7
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
Get full text
Get full text
Article -
8
Efficient Implementation of 2D Barcode Verification Algorithm for IoT Applications
Published 2023Conference Paper -
9
-
10
-
11
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Real-time time series error-based data reduction for internet-of-things applications
Published 2018Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Extended RECTANGLE Algorithm Using 3D Bit Rotation to Propose a New Lightweight Block Cipher for IoT
Published 2024journal::journal article -
14
Development of Image Recognition for Underwater Vehicle Applications
Published 2011“…It is also expected to recognize biological underwater object to support on deck auto monitoring system. The developed algorithm will be used to recognize relevant underwater object or living thing. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
17
-
18
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
19
Internet of things (IoT) based grid tension monitoring system
Published 2022“…The Internet of things method use in this monitoring system is by using ThingSpeak web and Blynk application. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Two-Phases QR Authentication Algorithm (2PQRA) for Digital Energy and IoT Applications
Published 2023Conference Paper
