Search Results - (( developing pre construction algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- construction algorithm »
- application mining »
- pre construction »
- java application »
- mining algorithm »
- developing pre »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
An improved pixel-based and region-based approach for urban growth classification algorithms / Nur Laila Ab Ghani
Published 2015“…The improved algorithm is constructed by adding new parameter and classification rule to existing algorithm. …”
Get full text
Get full text
Thesis -
9
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…Collaborative research with MIMOS Cyber-security Laboratory are using the strong UCE S-Boxes to develop hybrid round functions and key distribution algorithms to construct the UCE block cipher. …”
Get full text
Get full text
Proceeding Paper -
10
Image based autonomous indoor parallel parking assist on omni-directional vehicle (ODV)
Published 2016“…The image processing algorithm is first developed using Visual Studio C++ and OpenCV. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Development of two matheuristics for production-inventory-distribution routing problem / Dicky Lim Teik Kyee
Published 2018“…Whilst in MatHeuristic2, we adopt a slightly different approach. The algorithm starts with the pre-processing stage where the routes are determined to act as input to the MIP in Phase 1. …”
Get full text
Get full text
Get full text
Thesis -
12
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…Algorithm Visualization (AV) is a pedagogical tool that can help learners to see the animation of the step-by-step process of an algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…We also developed an unsupervised algorithm utilizing a wavelet method to remove eye blink artifacts. …”
Get full text
Get full text
Article -
14
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…We also developed an unsupervised algorithm utilizing a wavelet method to remove eye blink artifacts. …”
Get full text
Get full text
Get full text
Article -
15
-
16
3D solid robot animation design based on ADAMS
Published 2023“…It is of great significance to propose an efficient and improved inverse kinematics algorithm for the development of robotic bionics in China. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Modeling Teacher's Integrity Using Data Mining
Published 2010“…To obtain this, a dataset from a survey conducted by Pejabat Pelajaran Daerah Langkawi is taken as case study for the model construction. The dataset called teachers's integrity dataset contain 1500 records elaborates with 25 attributes including a target class were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Real-time interactive spatial augmented reality (RISAR) platform
Published 2022“…Therefore, this research project aims to design and develop a tracker-based SAR platform to resolve the aforementioned challenges. …”
Get full text
Thesis -
19
Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis
Published 2017“…Hybrid neural network was utilized as an evaluation method to select the optimal selection method and optimal training algorithm. The employment of automated toolbox is a straightforward process constructed from eight sub-tools to prepare, train, and processes the data. …”
Get full text
Get full text
Thesis -
20
Real-time safety helmet detection using enhanced YOLOv5 object detection
Published 2023“…Personal Protective Equipment (PPE) regulations require construction workers to wear safety helmets to ensure site safety. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
