Search Results - (( evolution information needs algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    An implementation of differential evolution algorithm for a single product and single period multi-echelon supply chain network model by Ayda, Emdadian, Ponnambalam, S. G., Kanagaraj, G.

    Published 2018
    “…In this paper, five variants of Differential Evolution (DE) algorithms are proposed to solve the multi-echelon supply chain network optimization problem. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Agro-ento bioinformation: towards the edge of reality by Syed Hassan, Syed Tajuddin

    Published 2002
    “…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
    Get full text
    Get full text
    Inaugural Lecture
  11. 11

    Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM) by Shuwandy, Moceheb Lazam

    Published 2012
    “…In addition, it uses two keys to encryption and decryption. However, this method needs to be develops and supports the protection of information. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Evaluation of Search Result of Document Search Based GA (DSEGA) by Kamal Norfarid, Kamaruddin

    Published 2004
    “…It is composed by a series of module that using information retrieval method and genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Delay-Prioritized Scheduling (DPS) for Real Time Traffic in 3GPP LTE System by Sandrasegaran, Kumbesan, Mohd. Ramli, Huda Adibah, Basukala, Riyaj

    Published 2010
    “…The proposed algorithm utilizes each user’s packet delay information and its instantaneous downlink channel conditions when making scheduling decisions. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15
  16. 16

    A comparative study for parameter selection in online auctions by Gan, Kim Soon

    Published 2009
    “…Due to the complex and dynamic nature of the online auction, one of the strategies employed is using genetic algorithm to discover the best strategy. Hence, this work attempts to improve an existing bidding strategy by taking into accounts the evolution of various model of generic algorithm in optimizing the parameter of the bidding strategies. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Channel quality indicator for long term evolution system based on adaptive threshold feedback compression scheme by Abdulhasan, Muntadher Qasim

    Published 2014
    “…CQI feedback is an essential technique in describing the channel state information of LTE system. Hence, CQI calculations highly depend on the accuracy of the channel estimation process. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Handbook of research on smart computing for renewable energy and agro-engineering by Kharchenko, V., Vasant, P.

    Published 2019
    “…While existing technologies may help in crop processing, there is a need for studies that seek to understand how modern approaches like artificial intelligence, fuzzy logic, and hybrid algorithms can aid the agricultural process while utilizing energy sources efficiently. …”
    Get full text
    Get full text
    Book
  19. 19

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…In scientific literatures, packet anonymization is performed according to attribute types (numerical, categorical and hierarchical), not taking into consideration the singular characteristics of the Modbus packet fields, using Euclidean distance algorithms that are not capable to deal with binary data and may result in information loss. …”
    Get full text
    Get full text
    Thesis
  20. 20