Search Results - (( development communication skill algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- development communication »
- communication skill »
- application mining »
- java application »
- mining algorithm »
- skill algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
The thoughts of Imam Ash-shafi’ie on interpersonal skills in self development: a conceptual analysis
Published 2013“…Interpersonal skill refers to an algorithm of mental and communication adopted in social and communication interaction in achieving specific impact and decision. …”
Get full text
Get full text
Non-Indexed Article -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Convergence Analysis of the African Buffalo Optimization Algorithm
Published 2016“…This paper presents the convergence analysis of the newly-developed African Buffalo Optimization algorithm. African Buffalo Optimization is a simulation of the organizational skills of the African buffalos using two basic sounds: /waaa/ and /maaa/ as they transverse the African landscape in search of grazing pastures. …”
Get full text
Get full text
Get full text
Article -
10
Clustering autism spectrum disorder student’s system based on intelligence, skills and behavior using agglomerative clustering algortihm / Daarin Nadia Nordin
Published 2020“…Thus, this project proposes a solution to the problems by utilizing the machine learning approach which is the Agglomerative clustering algorithm. Previous studies shows that homogenous grouping of autistics students yields positive results, therefore, this project proposes to design and develop a clustering model system known as the CASDSS (Clustering Autism Spectrum Disorder Students System) where the main goal of this system is to create a homogenous grouping of the ASD students based on their behaviour, skills and intelligence. …”
Get full text
Get full text
Thesis -
11
Investigating computational thinking among primary school students in Terengganu using visual programming
Published 2022“…Recent studies have shown that visual programming is one of the efficient tools to develop CT skills. The measurement of CT skills is indicated by CT skills competency. …”
Get full text
Get full text
Thesis -
12
-
13
Impact of Computational Thinking and Computer Science (CTCS) Teaching Technique at Seleceted Schools in Sarawak : A Qualitative Analysis
Published 2023“…The reception stems from CT’s ability to promote critical thinking, problem solving, and communication skills, consequently leading to greater collaborations between students and teachers.…”
Get full text
Get full text
Get full text
Proceeding -
14
Development of MATLAB® GUI for infant cry signal analysis using FFT / Suzilawati Muhamud @ Kayat
Published 2008“…The development; of GUI requires a good understanding and skills in programming the M-File code and it was the most challenging part for this study.…”
Get full text
Get full text
Thesis -
15
From Employees to Entrepreneurs: A Qualitative Exploration of Career Transitions in Ghana
Published 2025“…The main challenges faced by Higher Education Institutions (HEIs) in Indonesia in the context of Industrial Revolution (IR) 4.0 lie in the development of knowledge- intensive skills and the development of outcome-oriented curricula. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Imitation learning through self-exploration : from body-babbling to visuomotor association / Farhan Dawood
Published 2015“…Imitation learning through self-exploration is essential in development of sensorimotor skills in infants. Self-exploration is regarded as a procedure by which infants become perceptually observant to their own body and engage in a perceptual communication with themselves. …”
Get full text
Get full text
Thesis -
17
An Artificial Intelligence-Based Knowledge Management System for Outcome-Based Education Implementing in Higher Education Institutions
Published 2025“…The main challenges faced by Higher Education Institutions (HEIs) in Indonesia in the context of Industrial Revolution (IR) 4.0 lie in the development of knowledge intensive skills and the development of outcome-oriented curricula. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Understanding the Causes of Design Errors in Construction Projects: A DEMATEL-Based Framework
Published 2024“…The findings confirm that the top three important causes of design errors are inadequate design experts (C1), lack of skills and experience (C2), and poor communication in a design team (C4). …”
Get full text
Get full text
Get full text
Get full text
Article -
19
The development of secure interface system for wi-fi internet access using blended approach of captive portals and key verification techniques / Kamarul Ariffin Abdul Basit … [et a...
Published 2014“…The first protection is when any user tries to use the Internet facilities (through the communication to the access point), their device will be directed to our SiS. …”
Get full text
Get full text
Get full text
Book Section
