Search Results - (( java application mining algorithm ) OR ( encoder implementation model algorithm ))
Search alternatives:
- encoder implementation »
- implementation model »
- application mining »
- java application »
- mining algorithm »
- model algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Implementation of quantization in MPEG-2 encoder using Xilinx FPGA technology
Published 2007“…The design is then implemented on two Xilinx FPGA technology; Spartan and Virtex model to study the speed of processing and resource utilization on several chips on each model.…”
Get full text
Get full text
Student Project -
4
Computational Technique for an Efficient Classification of Protein Sequences With Distance-Based Sequence Encoding Algorithm
Published 2017“…Machine learning is being implemented in bioinformatics and computational biology to solve challenging problems emerged in the analysis and modeling of biological data such as DNA, RNA, and protein. …”
Get full text
Get full text
Article -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
Improved Distributed Wyner-Ziv Video Coding Based On Reed Solomon Error Correction Scheme And Frame Estimation For Wireless Transmission
Published 2015“…However, the LDPC involves complicated encoding and decoding algorithm. In this thesis, the LDPC is replaced with the Reed Solomon (RS) codes to encode the Wyner-Ziv frames. …”
Get full text
Get full text
Thesis -
7
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…In constructing the SHA-256 algorithm, high speed, compact size, and low power consumption are all factors to be taken into account for an efficient implementation. …”
Get full text
Get full text
Get full text
Proceeding -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
11
VLSI implementation of huffman design using FPGA with a comprehensive analysis of power restrictions
Published 2015“…In order to implement the encoder and decoder architectures, 130 nm standard cell libraries was used for ASIC implementation. …”
Get full text
Get full text
Get full text
Article -
12
Re-gripping analysis based on implementation of slip-detection device for robotic hand model
Published 2016Get full text
Get full text
Conference or Workshop Item -
13
An autonomous wheelchair speed control using fuzzy logic controller / Muhammad Ashraf Mohamad Ghazali
Published 2025“…MATLAB Simulink simulation was utilized to model and validate the FLC before hardware implementation. …”
Get full text
Get full text
Thesis -
14
Optimization of multi-holes drilling path using particle swarm optimization
Published 2022“…This research aims to model and optimise multi-hole drilling problems using Particle Swarm Optimisation (PSO) algorithm. …”
Get full text
Get full text
Thesis -
15
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
16
Prediction of COVID-19 outbreak using Support Vector Machine / Muhammad Qayyum Mohd Azman
Published 2024“…In response to the unprecedented challenges posed by the COVID-19 pandemic, this research project presents a systematic approach to outbreak prediction, specifically advocating for the implementation of Support Vector Machine (SVM) algorithms. …”
Get full text
Get full text
Thesis -
17
Survey on encode biometric data for transmission in wireless communication networks
Published 2023“…The transmission in wireless network coverage depicted with several signal transmission data rate with 10 Mbps as it has lowest coverage issue with moderate range of propagation distance using enhanced model to encode biometric data for transmission in wireless communication. � 2021. …”
Article -
18
Gripping controller design for a one-degree-of-freedom robotic hand model based on slip detection
Published 2016“…This conclude that the rotary encoder is better for slip detection in this robotic hand model…”
Get full text
Get full text
Thesis -
19
A chaotic neural network based encryption algorithm for MPEG-2 encoded video signal
Published 2012Get full text
Working Paper -
20
The design and implementation of Malaysian indigenous herbs knowledge management system based on ontology model
Published 2016“…This paper introduces the design and implementation of an Ontology-Based Malaysian Herbal Knowledge Based System (MiHerbs).The ontology model used in this research is based on a previous research with title, ’Malaysia Indigenous Herbs Knowledge Representation’.The research proposed an Ontology based knowledge representation model of Malaysian indigenous herbs using Web Ontology Language (OWL).The model can be used to encode and store knowledge in a “Knowledge Base” such as database, repository or library. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
