Search Results - (( developing information seeking algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Information Security Analysis and Solution using LSB Steganography and AES Cryptographic Algorithm by Nurul Adha, Oktarini Saputri, Novita Epa, Sari

    Published 2023
    “…Our research presents a method for this study, which involves hiding digital images with color at a depth of 24 bits. Through the development of a system to improve the security and confidentiality of data in the form of critical messages, this study seeks to provide senders with solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Computational dynamic support model for social support assignments around stressed individuals among graduate students by Al-Shorman, Roqia Rateb

    Published 2020
    “…Hence, this study aims to develop the dynamic configuration algorithm to provide an optimal support assignment based on information generated from both social support recipient and provision computational models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Comparison of anonymous tracker algorithms / Nur Shafikah Mat Daud by Mat Daud, Nur Shafikah

    Published 2014
    “…Based on this research, the objectives to be achieved are to identify IP Address of anonymous tracker, to locate IP Address where anonymous tracker location and comparison of anonymous tracker algorithms. The research metodology consists of several steps consists of gathering information, data collection, data analysis and system development and finally result analysis. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension by Affandy

    Published 2015
    “…This model is then to be used in the prototype tool development that is called 3De-ALPROV (Design Development Debug – Algorithm Program Visualization). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions by Gorment N.Z., Selamat A., Cheng L.K., Krejcar O.

    Published 2024
    “…This paper seeks to conduct a thorough systematic literature review (SLR) and offer a taxonomy of machine learning methods for malware detection that considers these problems by analyzing 77 chosen research works related to malware detection using machine learning algorithm. …”
    Article
  14. 14

    A review on classifying and prioritizing user review-based software requirements by Salleh, Amran, Said, Mar Yah, Osman, Mohd Hafeez, Hassan, Sa’Adah

    Published 2024
    “…Additionally, an updated matrix taxonomy has been developed based on a combination of definitions from various studies to classify user reviews into four main categories: information seeking, feature request, problem discovery, and information giving. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Assisting novice researchers in utilizing the web as a platform for research: Semantic approach by Ismail M.A., Yaacob M., Kareem S.A., Nasaruddin F.H.

    Published 2023
    “…Support in the early stage of study is crucial for novice researchers as it will give them some insights of where to seek for extra information based on institutions, people and research trend without having to go through tedious process of identifying this information all by themselves. …”
    Article
  16. 16

    Assisting novice researchers in utilizing the web as a platform for research: semantic approach by Ismail, M.A., Yaacob, M., Kareem, S.A., Nasaruddin, F.H.

    Published 2009
    “…Support in the early stage of study is crucial for novice researchers as it will give them some insights of where to seek for extra information based on institutions, people and research trend without having to go through tedious process of identifying this information all by themselves. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Stress mental health symptom assessment mobile application for young adults by Lee, Chun Hoong

    Published 2023
    “…Before this stage, the KNN algorithm is employed to construct the model using Google Form response data as part of the application development process. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  19. 19

    Investigation of the optimal sensor location and classifier for human motion classification by Anuar, Mohamed, Nur Aqilah, Othman, Hamzah, Ahmad, Mohd Hasnun Ariff, Hassan

    Published 2022
    “…In addition, this study seeks to find the best classification algorithm for human daily activities. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20