Search Results - (( developing human connection algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Wireless water quality cloud monitoring system with self-healing algorithm by Syed Ariffin, Sharifah Hafizah, Baharudin, Muhammad Ariff, Mohd Fauzi, Mohd Husaini, Abdul Latiff, Nurul Mu'azzah, Syed Yusof, Sharifah Kamilah, Abdul Latiff, Nurul Adilah

    Published 2017
    “…The self-healing algorithm is design to reduce human intervention and continuous data collected in the remote areas. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Performance enhancement of AIMD algorithm for congestion avoidance and control by Jasem, Hayder Natiq

    Published 2011
    “…National Chiao Tung University’s network simulation (NCTUns) has been used in this development to compare the new algorithm with the older versions and determine its advantages over the older versions. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Sensor module for urban vehicle two way connection monitoring system/ Muhammad Ilyasaa Abdul Rahman by Abdul Rahman, Muhammad Ilyasaa

    Published 2015
    “…This technical paper put forward a sensor module for urban vehicle two-way connection monitoring device which will be designed to detect conditions such as the presence of human after the car is centrally locked or the car is moved when the engine is off. …”
    Get full text
    Get full text
    Student Project
  11. 11

    A study on data-driven impedance matching in four channels bilateral teleoperation by Ramli, Mohd Syakirin, Ahmad, Hamzah, Razali, Saifudin, Othman, Nur Aqilah, Daud, Mohd Razali, Irawan, Addie, Mohd Nizam, Md Isa

    Published 2019
    “…The main objective of this research is to design and develop control algorithms to drive both sides of the master and slave system to attain symmetrical impedance between them. …”
    Get full text
    Get full text
    Research Report
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    RSSI-based human presence detection system for energy saving automation by Habaebi, Mohamed Hadi, Rosli, Rafhanah Shazwani, Islam, Md Rafiqul

    Published 2017
    “…A system module that can detect the presence of human is achieved by designing and developing a device that utilizes off-the-shelves hardware, implementing a statistical analysis algorithm and by testing and evaluating the performance of the developed system in a real life environment. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Home intruder detection system using machine learning and IoT by Sahlan, Fadhluddin, Feizal, Faeez Zimam, Mansor, Hafizah

    Published 2022
    “…HIDES implements an object detection algorithm; Single-Shot Multibox Detection (SSD) in NVIDIA Jetson Nano to detect intruders through a camera connected to the system. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Current applications of machine learning in dentistry by Ghazali, Ahmad Badruddin, Reduwan, Nor Hidayah, Ibrahim, Roliana

    Published 2022
    “…The difference between ANN and CNN is that in CNN, only the last layer is fully connected, but in ANN, each neuron is connected with the other (Kumar, 2017). …”
    Get full text
    Get full text
    Book Chapter
  19. 19

    Automating commercial video game development using computational intelligence by Tse, Guan Tan, Teo, Jason Tze Wi, Patricia Anthony

    Published 2011
    “…Approach: The aim of this study is an attempt to create an autonomous intelligent controller to play the game with no human intervention. Our approach is to use a simple but powerful evolutionary algorithm called Evolution Strategies (ES) to evolve the connection weights and biases of feed-forward Artificial Neural Networks (ANN) and to examine its learning ability through computational experiments in a non-deterministic and dynamic environment, which is the well-known arcade game, called Ms. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Intelligent Color Vision System For Ripeness Classification Of Oil Palm Fresh Fruit Bunch by Fadilah, Norasyikin

    Published 2015
    “…Images of oil palm FFBs of type DxP Yangambi are acquired using an IP camera which is attached to the end of a pole and connected to a computer via the RJ45 cable. The images are collected and analyzed using digital image processing techniques. k-means clustering algorithm is used to segment the image into two separate regions which are fruit and spike regions. …”
    Get full text
    Get full text
    Thesis