Search Results - (( developing innovative protocol algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges by Hussein, Nehad Hameed, Koh, Siaw Paw, Yaw, Chong Tak, Tiong, Sieh Kiong, Benedict, F., Yusaf, Talal, K., Kadirgama, Tan, Chung Hong

    Published 2024
    “…Finally, the challenges and upcoming research directions for developing such protocols are widely stated here. By presenting such insights, this paper provides a comprehensive overview and inspires researchers to enhance existing protocols and explore novel solutions, thereby paving the way for innovation in this field.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges by Hussein N.H., Koh S.P., Yaw C.T., Tiong S.K., Benedict F., Yusaf T., Kadirgama K., Hong T.C.

    Published 2025
    “…Finally, the challenges and upcoming research directions for developing such protocols are widely stated here. By presenting such insights, this paper provides a comprehensive overview and inspires researchers to enhance existing protocols and explore novel solutions, thereby paving the way for innovation in this field. …”
    Article
  12. 12
  13. 13

    Smart site monitoring system / Muhammad Azmi and Muhammad Naim Mahyuddin by Azmi, Muhammad, Mahyuddin, Muhammad Naim

    Published 2023
    “…The primary objective of this project is to develop a comprehensive system that enhances real-time monitoring, improves safety protocols, and streamlines communication among stakeholders. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Software reusability in green computing / Ibraheem Y. Y. Ahmaro by Y. Y. Ahmaro, Ibraheem

    Published 2013
    “…It can be discerned that the main software reusability approaches used in the IT industry include design patterns, component-based development and application frameworks. Telecommuting is the main green computing approach while algorithmic efficiency, power management, voice over internet protocol (VOIP) and virtualization approaches are also commonly used methods. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Smartening the environment using wireless sensor networks in a developing country by Pathan, Al-Sakib Khan, Hong, Choong Seon, Lee , Hyung-Woo

    Published 2006
    “…Regardless of such extensive efforts in optimizing the hardware, algorithm, and protocols for networking, there still remains a lot of scope to explore how these innovations can all be tied together to design Wireless Sensor Networks (WSN) for smartening the surrounding environment for some practical purposes. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  16. 16

    Plug and play innosat ACS simulator by Siti Maryam, Sharun, Mohd Yusoff, Mashor, Fadzilah, Hashim

    Published 2015
    “…From both results, it is enough to verify that the developed protocol working satisfyingly and seems to be possible to be implemented on the actual flight.…”
    Get full text
    Get full text
    Article
  17. 17

    eVtols : smart air mobility project / Muhammad Faiz Abu Hassan by Abu Hassan, Muhammad Faiz

    Published 2024
    “…AI algorithms govern adaptive decision-making, enabling real-time responses to evolving threats and emergencies. …”
    Get full text
    Get full text
    Book Section
  18. 18
  19. 19

    A smart metering for energy management system via GSM-SMS based protocol by Fakharuddin, Azhar

    Published 2011
    “…Energy resources and their management is one of the prime challenges to world especially developing countries like Malaysia where the significant contribution to energy generation is based on imported resources. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets by Mubarak, Sinil, Habaebi, Mohamed Hadi, Islam, Md. Rafiqul, Khan, Sheroz

    Published 2021
    “…The processed metadata is normalized for the easiness of algorithm analysis and modelled with machine learning-based latest deep learning ensemble LSTM algorithms for anomaly detection. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper