Search Results - (( java application mining algorithm ) OR ( _ visualisation mining algorithm ))

  • Showing 1 - 15 results of 15
Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  8. 8
  9. 9
  10. 10

    A COMPARISON STUDY OF DATA CLUSTERING AND VISUALISATION TECHNIQUES WITH VARIOUS DATA TYPES by Ling, Chien

    Published 2020
    “…It can be applied in data mining exploration and statistical data analysis. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  11. 11
  12. 12

    Mining and integration of oral cancer genomics for predictive therapeutics / Bernard Lee Kok Bang by Bernard Lee, Kok Bang

    Published 2019
    “…Technical evaluation of performance reliability of six gene signature similarity scoring algorithms showed that the Weighted Connectivity Score or the statistically significant Connectivity Map, are prime candidates for upgrading the current core algorithm of DeSigN, which is based on the Kolmogorov-Smirnov statistic. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  14. 14

    The summer heat of cryptojacking season : Detecting cryptojacking using heatmap and fuzzy by Ahmad Firdaus, Zainal Abidin, Aldharhani, Ghassan Saleh, Zahian, Ismail, Mohd Faizal, Ab Razak

    Published 2022
    “…After that, this study employs the heatmap method to visualise the PMCC value as a colour version of heat. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Forecasting utility management in UiTMCTKKT using predictive analytics / Nur Sufiah Muhammad Taufik by Muhammad Taufik, Nur Sufiah

    Published 2025
    “…Future iterations could also improve the system using real-time monitoring and machine-learning based predictive algorithms.…”
    Get full text
    Get full text
    Thesis