Search Results - (( java application mining algorithm ) OR ( after implementation case algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Multi-objective optimisation of assembly line balancing type-e problem with resource constraints by Masitah, Jusop

    Published 2016
    “…The validation phase from the industrial case study concluded that the proposed methodology and algorithm can be implemented in industries. …”
    Get full text
    Get full text
    Thesis
  10. 10

    The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm. by Jasem, Hayder Natiq, Ahmad Zukarnain, Zuriati, Mohamed, Othman, Subramaniam, Shamala

    Published 2010
    “…Now and after got this results as low delay for bottleneck link case, we know the New-AIMD mechanism work as well under the network condition in the experiments.…”
    Get full text
    Get full text
    Article
  11. 11

    Cyberbullying detection: a machine learning approach by Yeong, Su Yen

    Published 2022
    “…The machine learning algorithm, Support Vector Machine was chosen after comparing it with other algorithms such as Multinomial Naïve Bayes, Decision Tree Classifier, and Random Forest Classifier. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Implementation of RBG-HS-CbCr skin colour model using mobile python PyS60 by Ngui,, Lin Hui.

    Published 2009
    “…The programming language used in this project is Mobile Python or PyS60 and the written source code is executed on the S60 device mobile platform, whic h is the Nokia N95 in this case. Experimental results are obtained through test s conducted and after several analyses; it is found out that RGB - H - CbCr presents the best algorithm to be used in e xtracting the human skin colour, after a slight modification.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  13. 13

    Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area by Lim , Yen Ruen

    Published 2017
    “…Among all of the cryptography measures, Secure Hash Algorithm 3 (SHA-3) is the newest and secure cryptographic hash algorithm in the current electronic industry. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Simulated kalman filter (SKF) based image template matching for distance measurement by using stereo vision system by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2018
    “…Based on literature, stereo algorithm is already being implemented to solve the distance measurement problem. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    An optimized attack tree model for security test case planning and generation by Omotunde, Habeeb, Ibrahim, Rosziati, Ahmed, Maryam

    Published 2018
    “…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
    Get full text
    Get full text
    Article
  19. 19

    Automated call receiving and forwarding mechanism for supporting integrated disaster management system by Khamis, N.A., Chin Yang, L., Nordin, A.

    Published 2014
    “…The efficiency of the algorithm is evaluated by comparing the response time of the current procedures with the implementation of the algorithm in the proposed prototype. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Performance study of adaptive filtering algorithms for noise cancellation of ECG signal by Islam S.Z., Islam S.Z., Jidin R., Ali M.A.M.

    Published 2023
    “…In this paper, the four types of AC and DC noises have been implemented according to their basic properties. After that, these noises have been mixed with ECG signal and nullify these noises using the LMS and the RLS algorithms. …”
    Conference paper