Search Results - (( developing workplace selection algorithm ) OR ( java implementation mining algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Artificial Neural Network in Predicting Risk Exposure in Malaysian Shipyard Industry by David Chua, Sing Ngie, Calvin Chin, Yen Chih, Lim, Soh Fong

    Published 2024
    “…Several network architectures were developed and the best model was selected for the risk exposure prediction of workers in the shipyard industry. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Speed-up robust features based 3D object recognition for grasping by three fingered robot hand / Nurul Hanani Remeli by Remeli, Nurul Hanani

    Published 2018
    “…The information from the method with less detection error is later selected to calculate the object position. Next, the 3D position and grasping points of target object was determined by combining the recognised positions from two 2D SURF images and the triangulation method .The identified object grasping points were then converted to robot space using the robot’s transformation equation derived based on the locations and orientation of robot and camera in the 3D workplace. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Real-time personal protective equipment compliance detection using you only look once by Nurhanisah, Aminuddin, Nor Azuana, Ramli, Pratondo, Agus

    Published 2024
    “…Developing automated systems to detect and identify protective equipment in working sites is not just a technical accomplishment but also a significant step towards improving the workplace, especially in high-risk areas like construction and manufacturing sites. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item