Search Results - (( developing information gathering algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- developing information »
- information gathering »
- gathering algorithm »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012“…There are information gathering, analysis, design interface, prototype development, testing and evaluation and last but not least documentation. …”
Get full text
Get full text
Thesis -
8
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
Get full text
Get full text
Thesis -
9
Static image of hand gesture for numerical sign language recognition system using backfrofagation neural network / Erman Ibrahim
Published 2007“…The usefiil information can be used as a basic idea towards project methodology whereby a detail development process presented. …”
Get full text
Thesis -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…The Requirement Gathering and Analysis Phase ensures that all information is gathered to gain knowledge from all potential users of the system. …”
Get full text
Get full text
Get full text
Book Section -
12
Hiding Information Digitally Under Picture (HIDUP) using image steganography / Azli Amirul Ehsan Razali and Faiqah Hafidzah Halim
Published 2022“…The Requirement Gathering and Analysis Phase ensures that all information is gathered to gain knowledge from all potential users of the system. …”
Get full text
Get full text
Get full text
Book Section -
13
WBEC: A web browsers evidence collection toolkit for web browsers usage in Windows 10
Published 2022“…Furthermore, because the hashing algorithm employed in present technologies is MD5, the evidence gathered still lacks integrity. …”
Get full text
Get full text
Article -
14
CSGO: a game-inspired metaheuristic algorithm for global optimization
Published 2023“…This paper presents a video game-inspired meta-heuristic algorithm and its performance evaluation. This optimizer algorithm is developed by assembling impressive features of previous well-known optimizer algorithms such as stochastic fractal search (SFS), artificial gorilla troops optimizer (GTO) and marine predators algorithm (MPA) with addition of chaotic operators. …”
Get full text
Get full text
Conference or Workshop Item -
15
An Algorithm to Define Emotions Based on Facial Gestures as Automated Input in Survey Instrument
Published 2016“…Features of facial gestures that play important role in creating emotions are selected to be formulated in the algorithm.The aim of this paper is to produce an algorithm to define emotions based on three facial features namely mouth, eyes, and eyebrows.This is done by studying users and the problem domain, analyzing the relationship between emotions and facial gestures, and formulating solutions to the problem.This algorithm will be useful in developing a more interactive survey instrument and improving user interaction between researchers and dyslexic children.…”
Get full text
Get full text
Article -
16
Hybridised Network of Fuzzy Logic and a Genetic Algorithm in Solving 3-Satisfiability Hopfield Neural Networks
Published 2023“…The outcomes validate the significance of the results, and this comes from the fact that the proposed model has a positive impact. The information and concepts will be used to develop an efficient method of information gathering for the subsequent investigation. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
High Rise Building Evacuation Route Model Using DIJKSTRA'S Algorithm
Published 2015“…However, the original floor plan is visualised into 2D layout to gather the information on nodes and weights. The information then is used to generate a directed graph in order to obtain the shortest path results through the implementation of shortest path algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Old Jawi manuscript: Digital recognition / Zaidi Razak
Published 2016“…The literature review in this research looks at works conducted in the past on line and character segmentation as well as recognition systems. The information gathered is useful for the development of a line segmentation algorithm, a new character segmentation algorithm, as well as a recognition algorithm which is based on the use of a unique code and Hamming distance calculation. …”
Get full text
Get full text
Thesis -
19
COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM
Published 2023“…To investigate and capture the development of the pandemic, mapper algorithm can be used to visualize and analyse the COVID data set provided by the government. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
20
Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud
Published 2014“…Based on this research, the objectives to be achieved are to identify IP Address of anonymous tracker, to locate IP Address where anonymous tracker location and comparison of anonymous tracker algorithms. The research metodology consists of several steps consists of gathering information, data collection, data analysis and system development and finally result analysis. …”
Get full text
Get full text
Thesis
