Search Results - (( developing formative needs algorithm ) OR ( java applications mining algorithm ))
Search alternatives:
- developing formative »
- applications mining »
- java applications »
- mining algorithm »
- formative needs »
- needs algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Agreement options for negotiation on material location decision of housing development
Published 2020“…Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
Get full text
Get full text
Article -
9
A New Cell Formation Method Considering Operation Sequences And Production Volumes
Published 2013“…This research, presents an algorithm for cell formation to minimize intercellular movements. …”
Get full text
Get full text
Thesis -
10
The use of the Bayesian approach in the formation of the student's competence in the ICT direction
Published 2019“…The paper gives a small introduction about the competence of students and explores the possibility of using Bayesian networks in the formation of the competence of an IT trainer. Developed an integrated algorithm for the formation of the competence of training in the direction of IT.…”
Get full text
Get full text
Conference or Workshop Item -
11
Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli
Published 2018“…Next, developed an auto-formation group chatting where to create online group chat for nearby users and last but not least create an instant messaging for private chatting between users. …”
Get full text
Get full text
Student Project -
12
Multi-Agent Reinforcement Learning For Swarm Robots Formation
Published 2021Get full text
Get full text
Monograph -
13
Performance properties optimization of triaxial ceramic-palm oil fuel ash by employing Taguchi design and flower pollination algorithm
Published 2018“…The excessive cost and time consumed is a main issue if high number of experiments need to be performed. Primarily, this research is about the optimization of triaxial ceramic employing the POFA process by the Taguchi design and Flower Pollination Algorithm (FPA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Automatic assessment for engineering drawing
Published 2013“…This method is tedious as algorithms need to be developed for each shape to be assessed. …”
Get full text
Get full text
Article -
15
Implementation of local proprietary symmetric and asymmetric algorithm as secure plug-in on microsoft outlook / Mohd Izhar Jaafar
Published 2012“…New integration also have an extra value security because of the symmetric algorithm was developed locally in Malaysia. Apart from symmetric algorithm, Public Key Infrastructure technologies that one of the asymmetric algorithm have been select as a part of new integration. …”
Get full text
Get full text
Thesis -
16
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
Get full text
Get full text
Thesis -
17
SNR Based DSDV Routing Protocol for MANET
Published 2012“…In this project the Signal-to-Noise (SNR) based routing protocol has been adapted into the standard Destination Sequenced Distance Vector (DSDV) routing algorithm by developing an algorithm to calculate the cumulative average SNR from source to destination and apply the algorithm in the DSDV routing protocol. …”
Get full text
Get full text
Get full text
Thesis -
18
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…Furthermore, the shortest path algorithm needed additional features to produce better result. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Normalized Relational Storage for Extensible Markup Language (XML) Schema
Published 2011“…However we need to deal with thehierarchical nature of XML and to define XFDs in this structure. …”
Get full text
Get full text
Journal -
20
Estimating the optimal threshold value for foreign investment in Malaysia / Noorzahirah Mohd Sidek and Mahadzir Ismail
Published 2012“…The final outcome of this study is the formation of a generic theoretical model which is applicable, at least, in developing countries. …”
Get full text
Get full text
Research Reports
