Search Results - (( java application mining algorithm ) OR ( using based based algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis outlines the two different implementation techniques of the existing FLEX algorithm using java based parsers and using a query language for XML. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Mining Sequential Patterns using I-PrefixSpan by Saputra , Dhany, Dayang R.A. Rambli, Foong, Oi Mean

    Published 2008
    “…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. …”
    Get full text
    Get full text
    Citation Index Journal
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Block based motion vector estimation using fuhs16 uhds16 and uhds8 algorithms for video sequence by S. S. S. , Ranjit

    Published 2011
    “…Based on the theoretical and fundamental research analysis the FUHS16 and UHDS16 algorithms using 16 × 16 block-based motion estimation formulations were developed. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  9. 9

    Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms by Raheem, Ajiboye Adeleke, Hauwau, Isah-Kebbe, O., Oladele Tinuke

    Published 2014
    “…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Clustering ensemble learning method based on incremental genetic algorithms by Ghaemi, Reza

    Published 2012
    “…Moreover, experiments demonstrate that final clustering solution generated by the proposed incremental genetic-based clustering ensemble algorithm using the pattern ensemble learning method possess comparative or better clustering accuracy than clustering solutions generated by the incremental genetic-based clustering ensemble algorithms using other recombination operators. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman by Abdul Rahman, Faridah

    Published 2012
    “…Before this, Sudoku generator has been develop using backtracking algorithm only, but this research use two algorithm which is recursive and backtracking algorithm that called as hybrid algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Finding objects with segmentation strategy based multi robot exploration in unknown environment by Arezoumand, Reza, Mashohor, Syamsiah, Marhaban, Mohammad Hamiruce

    Published 2013
    “…Also the algorithm using segmentation strategy is using frontier base algorithm for exploring divided area. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Image Encrytion Using Block Based Transformation Algorithm by Bani Younes, Mohammad Ali, Jantan, Aman

    Published 2008
    “…In this paper, we introduce a block-based transformation algorithm based on the combination of image transformation and a well known encryption and decryption algorithm called Blowfish. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An enhanced swap sequence-based particle swarm optimization algorithm to solve TSP by Bibi Aamirah Shafaa Emambocus, Muhammed Basheer Jasser, Muzaffar Hamzah, Aida Mustapha, Angela Amphawan

    Published 2021
    “…Our aim is to �nd the shortest route in the delivery system by using the enhanced swap sequence based PSO. We evaluate the algorithm in terms of effectiveness and effeciency while solving TSP. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm by Lim, Mui Liang

    Published 2006
    “…The purpose of this project is to implement FPGA Base Encryption Chip using DES algorithm. Throughout the project, the suitability of the implementation DES algorithm in FPGA will be investigated. …”
    Get full text
    Get full text
    Monograph
  17. 17

    Malaysia Constitutional Law System, Study On The Use Advanced Searching Algorithm (Rule-Based And Horspool Algorithm) by Abd Razak, Nuur Farhani

    Published 2017
    “…Therefore, it is difficult for the users to find all the inter-related acts from the federal constitutional using manual method. In this research, we study about the concept of advanced searching algorithm to build an intelligent web based system. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…The algorithms involved were Genetic Algorithm, Differential Evolution Algorithm, Particle Swarm Optimization, Butterfly Optimization Algorithm, Teaching-Learning-Based Optimization Algorithm, Harmony Search Algorithm and Gravitational Search Algorithm. …”
    Get full text
    Get full text
    Thesis
  19. 19

    DC MOTOR CONTROL USING GENETIC ALGORITHM BASED PID by SHAHRONI, NURUL ASHIKIN

    Published 2011
    “…This dissertation presents the research that had been done on the chosen topic, works done and results acquired throughout the Final Year Project for two semesters, about the DC Motor Control using Genetic Algorithm based PID. The objectives of this project are to optimize speed control of the DC motor by using Genetic Algorithm based PID, to improve the performances of the DC motor controller in term of rise time, settling time, maximum overshoot and Integral of Time Absolute Error (ITAE) and to decide the best parameters to be used for Genetic Algorithm that can optimize the performance of a DC Motor ( eg: population size, mutation rate and crossover value). …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Reservoir operation based on evolutionary algorithms and multi-criteria decision-making under climate change and uncertainty by Ehteram, Mohammad, Mousavi, Sayed Farhad, Karami, Hojat, Farzin, Saeed, Singh, Vijay P., Chau, Kwok Wing, El-Shafie, Ahmed

    Published 2018
    “…Results showed the volume of water to be released for the future period, based on all evolutionary algorithms used, was less than for the base period, and the bat algorithm with high-reliability index and low vulnerability index performed better among other evolutionary algorithms.…”
    Get full text
    Get full text
    Article