Search Results - (( development through commitment algorithm ) OR ( java implementation mining algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Effect of business social responsibility (BSR) on performance of SMEs in Nigeria by Gorondutse, Abdulahi Hassan

    Published 2014
    “…A conceptual framework was developed based on extant literatures and the develop model is based on these BSR constructs Data was collected through hand delivery method by sending questionnaires to 800 SMEs managers/owners. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The Naïve Bayes algorithm, Decision Tree algorithm and Support Vector Machine algorithm has been used to prevent the spam attack, as well as the phishing attack. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Optimal economic load dispatch using multiobjective cuckoo search algorithm by Yasin Z.M., Aziz N.F.A., Salim N.A., Wahab N.A., Rahmat N.A.

    Published 2023
    “…In this paper, Multiobjective Cuckoo Search Algorithm (MOCSA) is developed to solve Economic Load Dispatch (ELD) problem. …”
    Article
  11. 11
  12. 12

    Skype multimedia application traffic analysis on home Unifi network / Siti Fatimah Ramle by Ramle, Siti Fatimah

    Published 2017
    “…This study is significant in developing a dynamic committed access rate algorithms line which would benefits the broadband network users.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Anders Breivik’s manifesto: measuring violence indicator in anti-Islamic extremist discourse by Cabrera Cusi, Mariet Rosnaida, Abdelaziz, Berghout

    Published 2024
    “…This research will be the first to apply algorithmic approach and it will demonstrate that using extremism measure tools developed by the Western academic can be applied to antiIslamic extremist discourse. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  14. 14

    Anders Breivik’s manifesto: measuring violence indicator in anti-Islamic extremist discourse by Cabrera Cusi, Mariet Rosnaida, Abdelaziz, Berghout

    Published 2024
    “…This research will be the first to apply algorithmic approach and it will demonstrate that using extremism measure tools developed by the Western academic can be applied to anti-Islamic extremist discourse. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Skyline queries on data with uncertain dimensions for efficient computation by Mohd Saad, Nurul Husna

    Published 2018
    “…The performance of SkyQUD-T is studied against two naïve algorithms that are developed to reflect the best-case and worst-case scenarios. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Characterization of miR-3099-mediated posttranscriptional of target genes regulation during neurogenesis in mice by Zainal Abidin, Shahidee

    Published 2019
    “…In 2011, miR-3099 was found to be expressed as early as in the blastocyst stage, in which the expression was maintained until the developing E11.5 mouse brain. The expression of miR-3099 was further restricted to the cortical plate of the developing mouse brain between E13.5 and E17.5, coinciding with the time that the majority of the cells are committed to neuronal cell lineage. …”
    Get full text
    Get full text
    Thesis
  17. 17