Search Results - (( developing novel method algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A novel hybrid classification model of genetic algorithms, modified k-Nearest Neighbor and developed backpropagation neural network by Salari, Nader, Shohaimi, Shamarina, Najafi, Farid, Nallappan, Meenakshii, Karishnarajah, Isthrinayagy

    Published 2014
    “…Among numerous artificial intelligence approaches, k-Nearest Neighbor algorithms, genetic algorithms, and artificial neural networks are considered as the most common and effective methods in classification problems in numerous studies. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10
  11. 11

    Novel algorithms of identifying types of Partial Discharges using electrical and non-contact methods / Mohammad Shukri Hapeez by Hapeez, Mohammad Shukri

    Published 2015
    “…Two novel algorithms are presented in this wok namely ‘Simple Partial Discharge Identifier (SPDI) and Fundamental Partial Discharge Identifier (FPDI) were developed to overcome the PD identification shortcoming……”
    Get full text
    Get full text
    Book Section
  12. 12

    A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm by Ahmed, M.A., Kiah, M.L.M., Zaidan, B.B., Zaidan, A.A.

    Published 2010
    “…In this study, we developed a novel method that is able to shift the limit for transparent data hiding in audio from the fourth LSB layer to the eighth LSB layer, thus the method has improved the capacity and robustness of data hiding in the audio file using a two steps approach. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Novel algorithm for mobile robot path planning in constrained environment by Muhammad, Aisha, Ali, Mohammed A. H., Turaev, Sherzod, Shanono, Ibrahim Haruna, Hujainah, Fadhl, Mohd Zubir, Mohd Nashrul, Faiz, Muhammad Khairi, Mohd Faizal, Erma Rahayu, Abdulghafor, Rawad Abdulkhaleq Abdulmolla

    Published 2021
    “…This paper presents a development of a novel path planning algorithm, called Generalized Laser simulator (GLS), for solving the mobile robot path planning problem in a two-dimensional map with the presence of constraints. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Novel algorithms of identifying types of partial discharges using electrical and non-contact methods / Mohammad Shukri Hapeez by Hapeez, Mohammad Shukri

    Published 2015
    “…Two novel algorithms are presented in this wok namely ‘Simple Partial Discharge Identifier (SPDI) and Fundamental-Partial Discharge Identifier (FPDI) were developed to overcome the PD identification shortcoming. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Application of sampling-based motion planning algorithms in autonomous vehicle navigation by Khaksar, Weria, Mohamed Sahari, Khairul Salleh, Tang, Sai Hong

    Published 2016
    “…Furthermore, a novel segmentation method is proposed, which divides the sampling domain into valid and tabu segments. …”
    Get full text
    Get full text
    Get full text
    Book Section
  17. 17

    A novel hierarchical clustering algorithm for the analysis of 3D anthropometric data of the human head by Ellena, Thierry, Subic, Aleksandar, Mustafaa, Helmy, Yen, Pang Toh

    Published 2018
    “…A novel hierarchical algorithm was developed, in which a squared Euclidean metric was used to assess the head shape similarity of participants. …”
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Machine learning algorithms in context of intrusion detection by Mehmood, T., Rais, H.B.Md.

    Published 2016
    “…Many machine learning techniques have been developed to cope with this problem. These machine learning algorithms develop a detection model in a training phase. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    A novel peak load shaving algorithm for isolated microgrid using hybrid PV-BESS system by Rana, M.M., Romlie, M.F., Abdullah, M.F., Uddin, M., Sarkar, M.R.

    Published 2021
    “…Peak shaving service can be found from this algorithm as a simple and forcible way. A comparative analysis has been conducted of the proposed algorithm with the conventional methods. …”
    Get full text
    Get full text
    Article