Search Results - (( developing implementing action algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment by Perumal, Thinagaran

    Published 2011
    “…Besides, this algorithm provides home users or application developers to implement their own event operators with bespoke syntax for their application purpose by defining cross-events corresponding to the event operators. …”
    Get full text
    Get full text
    Thesis
  10. 10

    DEEP LEARNING ALGORITHM IMPLEMENTATION FOR SHIP DETECTION IN SPOT SATELLITE IMAGES by HANIZAM, MOHD HAZIQ NAZMI

    Published 2019
    “…The deep-learning algorithm to be deployed is Faster R-CNN and to be implemented using MATLAB. …”
    Get full text
    Get full text
    Final Year Project
  11. 11
  12. 12
  13. 13

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…Finally, a software tool based on an adaptive neural network for power system security assessment was developed. The idea of the AANN approach presented in this thesis is to generalise the security assessment method with the consideration of remedial action for any operating point. …”
    Get full text
    Get full text
    Thesis
  14. 14

    The application of suitable sports games for junior high school students based on deep learning and artificial intelligence by Ji, Xueyan, Samsudin, Shamsulariffin, Hassan, Muhammad Zarif, Farizan, Noor Hamzani, Yuan, Yubin, Chen, Wang

    Published 2025
    “…This study intends to develop a Spatial Temporal-Graph Convolutional Network (ST-GCN) action detection algorithm based on the MediaPipe framework. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi by Mohamad Fauzi, Noor Shafiqa Fazlien

    Published 2020
    “…This study implemented Ant Colony Optimization Algorithm to develop classification rules for predicting the attackers of online shaming. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Modular motor driver with torque control for gripping mechanism by How D.N.T., Baharuddin M.Z., Mohideen S.S.K., Sahari K.S.M., Anuar A.

    Published 2023
    “…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
    Conference paper
  18. 18

    Classification of credit card holder behavior using K Nearest Neighbor algorithm / Ahmad Faris Rahimi by Rahimi, Ahmad Faris

    Published 2017
    “…This project consists of five phases which are preliminary study, data collection, system design, implementation, result and analysis. In the implementation phase, Bubble Sort, Euclidean Distance, 10-Fold Cross validation, and K Nearest Neighbor algorithm are developed. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Application Of The Blockchain Technology Within Healthcare by Lin, Michelle Hwei Yee

    Published 2021
    “…There are four proposed algorithms based on the actions of viewing and writing EMR, as well as another two additional actions aimed at improving the security of the blockchain framework. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis