Search Results - (( developing users connection algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Second Level Password Generator by Tay, Choo Chuan, Sakidin, Hamzah, Herman, Nanna Suryana, Baharon, Mohd Rizuan

    Published 2010
    “…Every time the user connects, he or she must provide the magic word; he must prove he is who he says he is. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7
  8. 8

    UiTM Malaysia route planner / Mohamad Yunus Mohamed Nasir by Mohamed Nasir, Mohamad Yunus

    Published 2008
    “…The objectives of this research/project are to provide information and guidance for users to find shortest path from familiar point or places to main entrance UiTM Malaysia by using car, to provide an approximation of the shortest distance between source and destination using Dijkstra's algorithm and to develop web based system UiTM Malaysia Route Planner for users who is familiar in Shah Alam.…”
    Get full text
    Get full text
    Thesis
  9. 9

    A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining by Jalali, Mehrdad

    Published 2009
    “…Moreover, navigation pattern mining has been done by finding connected components in the graph. In the online phase, the longest common subsequence algorithm is used as a new approach in recommendation system for classifying current user activities to predict user next movements. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Development Of Machine Learning User Interface For Pump Diagnostics by Lee, Zhao Yang

    Published 2022
    “…The main objectives for this project are focusing on the development of user interface that can connect with the machine learning build in Microsoft Azure for pump diagnostic purpose. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Efficient and stable routing algorithm based on user mobility and node density in urban vehicular network by Al-Mayouf, Y.R.B., Ismail, M., Abdullah, N.F., Wahab, A.W.A., Mahdi, O.A., Khan, S., Choo, R.K.K.

    Published 2016
    “…An appropriate, efficient, and stable routing algorithm must be developed for various VANET applications to address the issues of dynamic topology and intermittent connectivity. …”
    Get full text
    Get full text
    Article
  12. 12

    Quality of service management algorithms in WiMAX networks by Saidu, Ibrahim

    Published 2015
    “…Simulation have been extensively used to evaluate the proposed algorithm. Finally, Discrete Event Simulator (DES) is designed and developed in order to evaluate the performance of the proposed algorithms. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Joint optimization of resources allocation for quality of service aware next-generation heterogeneous cellular networks / Hayder Faeq Rasool Alhashimi by Hayder Faeq Rasool , Alhashimi

    Published 2025
    “…First, a greedy-based user association algorithm is proposed to allocate multiple users to MBS or SBSs to maximize the total sum rate. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Quality of service and scheduling performance optimization in LTE networks / Abubakar Auwal Idris by Abubakar Auwal , Idris

    Published 2017
    “…The developed scheduling algorithm is accomplished in three methodological stages as follows: first, frequency domain was considered for efficient scheduling at Resource Blocks (RBs) to the users based on best Channel Quality Indicator (CQI) report send from mobile station called as User Equipment (UE) to the base station (eNodeB). …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Characterization of Internet Traffic in UUM Wireless Networks by Abdullah, Wisam Dawood

    Published 2012
    “…Whereas, the growth of the wireless network with additional mobile devices in the UUM and increasing number of users led to slow wireless connection. Therefore, understanding the behavior of traffic analysis helps us to develop, manage WLAN technology, and deploy. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Smart IoT energy optimisation and localisation monitoring for e-bike sharing by Mohamed, Mawada Ahmed, Toha, Siti Fauziah, Rahman, Md Ataur, Khairudin, Moh.

    Published 2025
    “…The methodology involved integrating sensors to collect key data, implementing connectivity for real-time monitoring, and developing an energy optimization algorithm to prolong battery life, improving the efficiency of the e-bike sharing system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Improving Adaptive Quality of Service for Multimedia Wireless Networks Using Hierarchical Networks Approach by Kandasamy, Saravanan

    Published 2004
    “…The key feature of this framework is the integration of the hierarchical network together with the modified Call Admission Control (CAC) algorithm and the bandwidth reallocation scheme. These schemes are developed to control the bandwidth operation of ongoing connections when the system is overloaded depending on the movement speed of a particular user assuming the speed of a mobile user would not be changed throughout the duration of a connection. …”
    Get full text
    Get full text
    Thesis
  20. 20