Search Results - (( developing formative services algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- developing formative »
- formative services »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
A Comparative Study on Compression of Different Image File Formats
Published 1999“…In this project, an image compression format and algorithm has been analyses. A system has been created for user to convert or display image file format. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Video content adaptation based on user preferences and network bandwidth / Badariyah Bakhtiar
Published 2007“…System architecture was designed and implement in video adaptation algorithms development. Through the algorithm, rule-based technique was used. …”
Get full text
Get full text
Thesis -
10
Software Development For Conversion Of Ip To Wireless Atm (Watm)
Published 2002“…One of the main challenge in the design of the Wireless ATM network resides in the formation of the Wireless MAC protocol, that could handle various services with a considerable QoS and providing efficient utilization of the Wireless Channel. …”
Get full text
Get full text
Thesis -
11
-
12
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
Get full text
Get full text
Thesis -
13
-
14
The influence of Robo-advisory services on Malaysia university student’s investment intention
Published 2025“…The emergence of robo-advisory services has transformed the landscape of investment by offering automated, algorithm-driven financial planning with minimal human intervention. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Mobile Travel Guide For Tourism
Published 2007“…This system is using SMS as the user interface and it understands users' input with predetermined format as queries to access the database. Methodology that is practically adequate to be implemented in this system is Phased Development-based methodology. …”
Get full text
Get full text
Final Year Project -
16
Enhancing geographic coordinates representation standard for reverse geocoding web services
Published 2018“…These developments in Information and Communication Technologies (ICT) founded standardization diversity, where differences between web services providers and organizations committees, such International Standardization Organization (ISO) and Open Geospatial Consortium (OGC). …”
Get full text
Get full text
Thesis -
17
Multi-dimensional networking and distributed computing services
Published 2012“…For wider support of wireless connectivity and developing easy-to-use technologies, substantial efforts are underway to reduce human intervention in the configuration, formation, and maintenance processes of these networks. …”
Get full text
Get full text
Get full text
Article -
18
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
19
Design, development and evaluation of a game-based learning application for room housekeeping
Published 2024“…The methodology was structured into three phases: design, development, and evaluation. In the design phase, the game was tailored to meet educational objectives pertinent to hospitality studies, focusing on essential skills such as attention to detail, customer service, and operational efficiency. …”
Get full text
Get full text
Get full text
Article -
20
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article
