Search Results - (( developing organizations calling algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    An Adaptive Fuzzy Symbiotic Organisms Search Algorithm and Its Applications by Nurul Asyikin, Zainal, Azad, Saiful, Kamal Z., Zamli

    Published 2020
    “…This paper discusses the development of a Symbiotic Organisms Search Algorithm (SOS) variant, called Adaptive Fuzzy SOS (FSOS). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Stochastic process and tutorial of the African buffalo optimization by Odili, Julius Beneoluchi, Noraziah, Ahmad, Alkazemi, Basem, Zarina, M.

    Published 2022
    “…Organizing their large herds that could be over a thousand buffalos using just two principal sounds, the /maaa/ and the /waaa/ calls present a good foundation for the development of an optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Development of key-dependent dynamic S-Boxes with dynamic irreducible polynomial and affine constant by Agarwal, Praveen, Singh, Amandeep, Kilicman, Adem

    Published 2018
    “…Advanced encryption standard is an encryption algorithm which is widely used to provide security to sensitive information by organizations. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Stochastic process and tutorial of the African bufalo optimization by Odili, Julius Beneoluchi, Noraziah, Ahmad, Alkazemi, Basem Y., M., Zarina

    Published 2022
    “…Organizing their large herds that could be over a thousand buffalos using just two principal sounds, the /maaa/ and the /waaa/ calls present a good foundation for the development of an optimization algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Moreover, this study introduces a mining algorithm called PC-miner to mine the mining model frequently with various values of minsup. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm by Diallo, Alhassane Saliou, Al-Khateeb, Wajdi Fawzi Mohammed, Olanrewaju, Rashidah Funke, Fatai, Sado

    Published 2014
    “…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). The implementation of this proposal is based on the Arduino Integrated Development Environment (IDE) as software and a Bluetooth (BT) Shield connected to an Arduino Uno R3 boards as hardware. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Early autism spectrum disorder detection using machine learning / Muhammad Shahmi Shahron Nizan by Shahron Nizan, Muhammad Shahmi

    Published 2023
    “…This project aims to develop a web-based application utilizing the Random Forest Classification Algorithm to aid concerned parents in detecting potential Autism Spectrum Disorder (ASD) symptoms in their children aged 1-6 years in Malaysia. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Evolutionary genetic algorithm as a generative tools in identifying Malay, Chinese and Indian cultural product DNA / Izzuddinazwan Misri by Misri, Izzuddinazwan

    Published 2015
    “…This thesis presents an inquiry into the hybrid cross-cultural features of 3 majority races in Malaysia such the Malay, Chinese, and Indian using optimization tools called Genetic Algorithm in order to achieve new design DNA. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  18. 18

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Characterisation of essential proteins in proteins interaction networks by Sakhinah Abu Bakar, Javid Taheri, Albert Y Zomaya

    Published 2013
    “…The proposed method, namely EP3NN (Essential Proteins Prediction using Probabilistic Neural Network), employed a machine learning algorithm called Probabilistic Neural Network as a classifier to identify essential proteins of the organism of interest. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Analysis and modeling of database storage optimization power consumption usage for green data centers by Wan Noor Hamiza, Wan Ali

    Published 2014
    “…The proxies can be discovered by using a developed algorithm of functional dependencies (FDs) called as TANE algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis