Search Results - (( does visualization using algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- does visualization »
- application mining »
- java application »
- mining algorithm »
- using algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…Algorithms are a captivating use case for visualization. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Visual Public-Key Cryptosystems.
Published 2012“…Until recently, building a highly secured public-key cryptosystem without utilizing complex computations has been a serious challenge, making it necessary for investigations to develop new cryptography methods. Visual cryptography is special because the scheme requires visual inspection or the equivalence of simple Boolean computation and therefore, does not require complex computations.…”
Get full text
Get full text
Monograph -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
A New Visual Public-Key Cryptosystem Based On Non-Expansion Technique And Boolean Operations
Published 2011“…The basic design of visual cryptography exploits the human visual system, to recover secret images. …”
Get full text
Get full text
Thesis -
11
Single-trial visual evoked potential extraction using partial least-squares-based approach
Published 2016“…For P100, the proposed PLS algorithm is able to provide comparable results to the generalized eigenvalue decomposition (GEVD) algorithm, which alters (prewhitens) the EEG input signal using the prestimulation EEG signal. …”
Get full text
Get full text
Article -
12
Single-trial visual evoked potential extraction using partial least-squares-based approach
Published 2016“…For P100, the proposed PLS algorithm is able to provide comparable results to the generalized eigenvalue decomposition (GEVD) algorithm, which alters (prewhitens) the EEG input signal using the prestimulation EEG signal. …”
Get full text
Get full text
Article -
13
Exploration of COVID‑19 data in Malaysia through mapper graph
Published 2024“…Still, the hierarchical clustering does not further subdivide Selangor data into two to three separate clusters as the Mapper algorithm does. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…D3.js is used as a technology to visualize the result in interactive form or dynamic visualization which is a JavaScript library and Python is a language to program the system. …”
Get full text
Get full text
Thesis -
15
Event feedback analytic and visualization through Twitter social platform / Muhammad Faiz Sharan
Published 2020“…The sentiment of the feedback will be classify using machine learning algorithm in two categories which are positive and negative feedback. …”
Get full text
Get full text
Thesis -
16
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…The first algorithm locates interest points in food images using an MSER. …”
Get full text
Get full text
Thesis -
17
-
18
Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm
Published 2018“…Therefore, Jabatan Kemajuan Islam Malaysia (JAKIM) halal premises information is used to represent high data capacity. The thesis proposed a method to place a logo on top of the QR code, embedded with high data capacity, using Genetic Algorithm (GA) search technique to find appropriate size and location so the QR code can be decoded by various QR code decoders. …”
Get full text
Get full text
Get full text
Thesis -
19
VITILIGO LESION ASSESSMENT TOOL ON SMARTPHONE
Published 2013“…ICA algorithm does vast computations thus; ICA algorithm is used to improve segmentation performance. …”
Get full text
Get full text
Final Year Project -
20
Jobs Visualization and Salary Prediction System Based on Jobstreet Malaysia / Khyrina Airin Fariza Abu Samah ... [et al.]
Published 2021“…The extracted Jobstreet’s data runs the pre-processing, develops the model, and runs on real-world data. Linear Regression algorithm was used to predict the salary and tested using mean absolute error to validate the prediction. …”
Get full text
Get full text
Conference or Workshop Item
