Search Results - (( developing information usage algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops. by Mohd Akhir, Norhasiah

    Published 2004
    “…The combination usage of the algorithm, AVL, GPS and SMS server, the information regarding the time arrival of the transport can easily being retrieve by users. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    An Effective Fast Searching Algorithm for Internet Crawling Usage by Chia, Zhen Hon, Nor Azhar, Ahmad

    Published 2016
    “…One of the crucial usages is internet crawling to find the best information using keywords. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Quranic Cross-Lingual Information Retrieval Optimization using Hexadecimal Conversion Algorithm by Mazlan,M.M., Ismail,R., Norita Md. Norwawi, Fauziah Abdul Wahid

    Published 2024
    “…This research hypothesizes that the higher the reduction of space usage, the faster the retrieval time of CLIR. This article highlights the proposed Quranic Cross-Lingual Information Retrieval (Q-CLIR) model and Hexadecimal Conversion Algorithm. …”
    Article
  13. 13

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…Implementation of sentence-based searching and the usage of the stemming algorithm would be considered to produce more meaningful results for future work.…”
    Get full text
    Get full text
    Thesis
  14. 14

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
    Get full text
    Get full text
    Inaugural Lecture
  15. 15

    Taxonomy of memory usage in swarm intelligence-based metaheuristics by Yasear, Shaymah Akram, Ku-Mahamud, Ku Ruhana

    Published 2019
    “…Therefore, in advanced metaheuristics, memory is considered as one of the fundamental elements of an efficient metaheuristic. Issues in memory usage have also been highlighted. The results of this review are beneficial to the researchers in developing efficient metaheuristics, by taking into consideration the usage of memory.…”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Workload utilization dissemination on grid resources for simulation environment by Yahaya, Bakri, Latip, Rohaya, Abdullah, Azizol, Othman, Mohamed

    Published 2013
    “…A combination of these factors will help in developing an optimized scheduling or load balancing algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Methods of intrusion detection in information security incident detection: a comparative study by Tan, Fui Bee, Yau, Ti Dun, M. N. M., Kahar

    Published 2018
    “…The advance development in technology have made internet and online application and network usage become one of the important element in human life. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Predicting usage for a marketable e-learning portal by Yaacob, Aizan, Yusof, Yuhanis, Sheik Osman, Wan Rozaini, Derashid, Chek, Omar Khan, Zainizad

    Published 2014
    “…To date, existing e-learning portals focuses on providing various learning materials via online.Such an approach may provide huge benefit to the learners; nevertheless, less value can be obtained by the developers or owners.The knowledge transfer programme provides an insight on how existing e-learning portal can be upgraded.The academia has introduced the industry to a computational modelling that is built upon the behaviour of nature community (i.e bees)The utilization of Artificial Bee Colony algorithm in predicting learners' usage of an e-learning portal provides an indicator to the developers on the portals effectiveness.Such information is then useful in producing a marketable and valuable e-learning portal…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20