Search Results - (( developing effective context algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Multilevel optimization for dense motion estimation by Saaban, Azizan, Kalmoun, El Mostafa, Ibrahim, Haslinda, Ramli, Razamin, Omar, Zurni

    Published 2011
    “…We evaluated the performance of different optimization techniques developed in the context of optical flow computation with different variational models.In particular, based on truncated Newton methods (TN) that have been an effective approach for large-scale unconstrained optimization, we developed the use of efficient multilevel schemes for computing the optical flow.More precisely, we evaluated the performance of a standard unidirectional multilevel algorithm - called multiresolution optimization (MR/Opt), to a bidrectional multilevel algorithm - called full multigrid optimization (FMG/Opt).The FMG/Opt algorithm treats the coarse grid correction as an optimization search direction and eventually scales it using a line search. …”
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Context-aware diabetic patient remote monitoring using wearable and mobile App / Mohd Izzat Ismail Hashim by Ismail Hashim, Mohd Izzat

    Published 2019
    “…The goal of this mobile application is to provide a tool for caregivers to remote monitor diabetic patients, even when they are not nearby. Context-aware algorithm is applied in this application, where a criticality reading threshold is defined, classifying the readings criticality levels. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Algorithm for the legal regulation of internet financial crime by Ambaras Khan, Hanna, Ab. Rahman, Suhaimi, Xinxin, Mao

    Published 2024
    “…The study on the legal regulation of Internet financial crime holds significant importance in the context of the rapid development of China’s Internet finance and the increasing prevalence of crime in this sector. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Dynamic radius for context- aware recommender system by Alawadhi, Nayef, Taha Alshaikhli, Imad Fakhri, Alkandari, Abdulrahman

    Published 2021
    “…In this paper, a dynamic search radius algorithm is introduced as part of a context-aware recommender framework. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking by Saravanan, Perumal Shanthi, Balasundaram, Sadhu Ramakrishnan

    Published 2020
    “…Most of the existing location cloaking algorithms are only concerned with snapshot user locations and cannot effectively prevent users from location-dependent attacks when user location-contexts are continuously updated. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Modified word representation vector based scalar weight for contextual text classification by Abbas Saliimi, Lokman

    Published 2024
    “…Based on the acquired results, the experiments reveal that the modified word vectors algorithm can effectively alter original LLM-generated word vectors to reflect intended contexts and can outperform baseline scores in contextual text classification tasks. …”
    Get full text
    Get full text
    Thesis
  16. 16

    User interface and interactivity design guidelines of algorithm visualization on mobile platform by Supli, Ahmad Affandi

    Published 2019
    “…Algorithm Visualization (AV) is a pedagogical tool that can help learners to see the animation of the step-by-step process of an algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A comparative analysis of machine learning algorithms for diabetes prediction by Alansari, Waseem Abdulmahdi, Masnizah Mohd

    Published 2024
    “…As per the findings, the RF algorithm attained the maximum accuracy of 77% in the context of PIDD. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19
  20. 20

    An Efficient Energy Aware Adaptive System-On-Chip Architecture For Real-Time Video Analytics by Ahmed, Hisham Ahmed Ali

    Published 2016
    “…A Performance model for Zynq is developed using analytical method and used in hardware/software codesign to facilitate algorithms mapping to hardware. …”
    Get full text
    Get full text
    Thesis