Search Results - (( developing code mining algorithm ) OR ( java communication work algorithm ))
Search alternatives:
- java communication »
- communication work »
- mining algorithm »
- developing code »
- work algorithm »
- code mining »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…The appropriate Java codes are developed for solve this task. The developed patterns are applied in the field of real-time analysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
3
Evaluations of oil palm fresh fruit bunches maturity degree using multiband spectrometer
Published 2017“…Furthermore, the Lazy-IBK algorithm have been validated to produce the best classifier model, with the machine learning algorithm performance of 65.26%, recall of 65.3%, and 65.4% F-measured as compared to other evaluated machine learning classifier algorithms proposed within the WEKA data mining algorithm. …”
Get full text
Get full text
Get full text
Thesis -
4
A survey of energy-aware real time scheduling tools
Published 2015Get full text
Get full text
Conference or Workshop Item -
5
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…Political analysts often communicate with the public and exchange information through the social media platform. …”
Get full text
Get full text
Get full text
Thesis -
6
Network monopoly / Tan Kean Yeap
Published 2002“…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
Get full text
Get full text
Thesis -
7
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…Classification and prediction are the functions provided by the data mining techniques that suit in EEG signal processing. …”
Get full text
Get full text
Thesis -
8
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…A new multi-factor authentication scheme is designed using the AES-ECC algorithm based on Kerberos workflow to establish secure, efficient, and lightweight communication between the user and the targeted IIoT devices to avoid the issues. …”
Get full text
Get full text
Thesis -
9
A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES
Published 2020“…It can be applied in data mining exploration and statistical data analysis. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD
