Search Results - (( development process window algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- window algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…The algorithm development combines the frameworks from Phases 1 to 3, evaluating real and synthetic datasets. …”
Get full text
Get full text
Get full text
Thesis -
9
Development Of Stereo-Matching Algorithm Based On Adaptive Weighted Prediction
Published 2019“…This thesis proposes an algorithm to handle the limitations. Firstly, pre-processing used Sobel Filter was added at initial step to compensate photometric distortion of input images. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
VMware as an Intermediate Platform between Windows 7 and Linux Fedora 15 for Real-Time Malaysian Sign Language Translator
Published 2014“…The main significance of this approach is that the best characteristics of both operating systems LINUX Fedora 16 and Windows7 have been utilized. Under Windows7, Visual C++ 2010 combined with OpenCV pre 1.1 library supports video processing algorithms and has a power graphical user interface. …”
Get full text
Get full text
Proceeding Paper -
11
VMware as an intermediate platform between Windows 7 and Linux Fedora 15 for real-time Malaysian sign language translator
Published 2014“…The main significance of this approach is that the best characteristics of both operating systems LINUX Fedora 16 and Windows7 have been utilized. Under Windows7, Visual C++ 2010 combined with OpenCV pre 1.1 library supports video processing algorithms and has a power graphical user interface. …”
Get full text
Get full text
Get full text
Article -
12
-
13
Efficient hardware design for palm-dorsa vein image enhancement
Published 2018“…The aim of this thesis is to develop hardware design for palm-dorsa vein image enhancement algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Development of a new nonlinear filtering algorithm for impulse noise reduction
Published 2020Get full text
Get full text
Research Report -
15
Analyzing land surface temperature in response to massive urbanization by using single window algorithm in Penang Island / Ainna Naeemah Zainal Abidin
Published 2019“…Next will be the extraction of Land Surface Temperature (LST) by using Spectral Radiance Model and Single Window Algorithm through the satellite imagery. Last objectives will be the analysis on the relationship between the dependent and independent variables that be made through the correlation coefficient analysis. …”
Get full text
Get full text
Thesis -
16
-
17
Overview of metaheuristic: classification of population and trajectory
Published 2010Get full text
Get full text
Monograph -
18
-
19
The enhancement of mammographic images of breast cancer using median filtering (software development ) / Noor Saedah Selamat
Published 1996“…These algorithm are written in C code using BORLAND C++ in Windows environment , improvise the poor image to become a clear image using enhancement techniques. …”
Get full text
Get full text
Thesis -
20
Ciphercrypt-an Encryption System / Nor Hidayah Ngah
Published 2004“…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
Get full text
Get full text
Thesis
