Search Results - (( code location based algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm by Rohani, Fuaad

    Published 2018
    “…The thesis proposed a method to place a logo on top of the QR code, embedded with high data capacity, using Genetic Algorithm (GA) search technique to find appropriate size and location so the QR code can be decoded by various QR code decoders. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    A new corner detection algorithm for chain code representation. by Haron , Habibollah, Shamsuddin , Siti Mariyam, Mohamed, Dzulkifli

    Published 2005
    “…The algorithm is based on chain-coded image, deriving the slope between each code, analyze the series of chain code, and finally decide the existence of corner at the current pixel location. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Automated data process in participatory sensing using QR-code and EAN-13 barcode by Che Ya, Mohamad Fakhrul Syafiq

    Published 2018
    “…The enhanced algorithm was evaluated using a developed prototype which is an Android mobile application of a crowdsourcing data submission based on product price and information, WE+Price, in which, the algorithm was embedded. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Design of information hiding algorithm for multi-link network transmission channel by Fu, Songyin, Wang, Rangding

    Published 2019
    “…Traditional channel information hiding algorithms based on m-sequence for multi-link network transmission, which apply m-sequence to channel coding information hiding system, do not analyze the upper limit of hiding capacity of multi-link network transmission channel system, and do not consider the hidden danger of overlapping secret information when embedding secret information is too large. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    An Adaptive Error Correction Scheme For Synchronous Digital Hierarchy-Based Wavelength Division Multiplexed Optical Network by Cheah, Cheng Lai

    Published 2007
    “…A new technique is also proposed for estimation of the error pattern so that a suitable type of code can be assigned accordingly. This technique is based on the analysis of the corrected error locations, referred to as the error location analysis (ELA). …”
    Get full text
    Get full text
    Thesis
  15. 15

    Space allocation for examination scheduling using Genetic Algorithm / Alya Kauthar Azman by Azman, Alya Kauthar

    Published 2025
    “…The research adopts a Genetic Algorithm-based approach, where examination scheduling details such as date, time, course code, program code, student group, student numbers, and available spaces are encoded as chromosomes. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Framework for location based attendance system by using fourth industrial revolution (4ir) technologies by Ali, Azhar, Koondhar, Muhammad, Depar, Mansoor Hyder, Maher, Zulfikar Ahmed, Rind, Muhammad Malook, Shah, Asadullah

    Published 2021
    “…The designed framework used triple authentication i.e. biometric authentication, QR-code authentication, and location based authentication that reduced the risk of prone attendance.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Optimization in active vibration control: virtual experimentation using COMSOL multiphysics - MATLAB integration by Md Nor, Khairul Affendy, Abdul Muthalif, Asan Gani, Wahid, Azni N.

    Published 2014
    “…Ant colony optimization algorithm is employed for this purpose. Instead of using equation-based modeling for the system, the plant is a finite element model developed in COMSOL Multiphysics software, which later interfaced with the MATLAB-coded optimization algorithm using the Livelink for MATLAB feature. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20