Search Results - (( java application optimisation algorithm ) OR ( pattern using stepping algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Block matching algorithms for motion estimation using modified Cross-Diamond-Hexagonal search / Abd Razak Mahmud by Mahmud, Abd Razak

    Published 2008
    “…This algorithm basically employs two crossshaped search patterns consecutively in the very beginning steps and switch using diamond-shaped patterns. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Modifying iEclat algorithm for infrequent patterns mining by Julaily Aida, J., Mustafa, M.

    Published 2018
    “…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Discovering Pattern in Medical Audiology Data with FP-Growth Algorithm by G. Noma, Nasir, Mohd Khanapi, Abd Ghani

    Published 2012
    “…We use frequent pattern growth (FP-Growth) algorithm in the data processing step to build the FP-tree data structure and mine it for frequents itemsets. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Modifying iEclat algo ithm for infrequent patterns mining by Julaily Aida, Jusoh, Mustafa, Man

    Published 2018
    “…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Implementing case-based reasoning approach to framework documentation by Hajar M.J., Lee S.P.

    Published 2023
    “…During the "revise" and "retain" steps of the CBR, Knuth-Morris-Pratt (KMP) pattern matching algorithm is applied. � 2008 IEEE.…”
    Conference paper
  8. 8

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…The necessary steps for the proposed technique are identified, and algorithms of these steps are developed and implemented using Active Server Page (ASP) and then tested on two web pages. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Investigation of block matching algorithm for video coding by Faizul Hadi Mohamad Jamil

    Published 2013
    “…In this research, seven types of famous BMA techniques that are Exhaustive Search (ES), Three Step Search (TSS), New Three Step Search (NTSS), Simple and Efficient Three Step Search (SETSS), Four Step Search (4SS), Diamond Search (DS) and Adaptive Rood Pattern Search (ARPS) have been applied. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Content adaptive fast motion estimation based on spatio-temporal homogeneity analysis and motion classification by Nisar, Humaira, Malik, Aamir Saeed, Choi, Tae-Sun

    Published 2012
    “…In the first step, spatio-temporal correlation has been used for initial search centre prediction. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Web-based expert system for material selection of natural fiber- reinforced polymer composites by Ahmed Ali, Basheer Ahmed

    Published 2015
    “…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Analytical method for forensic investigation of social networking applications on smartphones by Dezfouli, Farhood Norouzizadeh

    Published 2016
    “…The identified patterns are then used to design an algorithm for detecting social networking data remnants automatically. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Coronary artery segmentation in angiograms with pattern recognition techniques - a survey by Tayebi, Rohollah Moosavi, Sulaiman, Puteri Suhaiza, O. K. Rahmat, Rahmita Wirza, Dimon, Mohd Zamrin, Kadiman, Suhaini, Abdullah, Lilly Nurliyana, Mazaheri, Samaneh

    Published 2013
    “…In this paper, we have divided these algorithms into five major classes and propose a survey for the main class, pattern recognition, which is a famous technique in this manner. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Comparative analysis of line search methods in the Steepest Descent algorithm for unconstrained optimization problems / Ahmad Zikri Shukeri, Puteri Qurratu Ain Megat Sulzamzamendi... by Shukeri, Ahmad Zikri, Megat Sulzamzamendi, Puteri Qurratu Ain, Ibrahim, Suhaida

    Published 2024
    “…The result from this study is choosing FMRI algorithm using exact line search to get faster convergence rate which means that the algorithm achieves a high level of accuracy in fewer iterations compared to using other algorithms and inexact line search.…”
    Get full text
    Get full text
    Student Project
  17. 17

    A comprehensive 3-phase framework for determining the customer’s product usage in a food supply chain by Mad Ali, Mohd Fahmi, Mohd Ariffin, Mohd Khairol Anuar, Delgoshaei, Aidin, Mustapha, Faizal, Supeni, Eris Elianddy

    Published 2022
    “…Moreover, using Calinski-Harabasz Index, it was found that the algorithm provided more logic scores while the number of product patterns was 3 for the studied region (707.54).…”
    Get full text
    Get full text
    Article
  18. 18

    An initial state of design and development of intelligent knowledge discovery system for stock exchange database by Che Mat @ Mohd Shukor, Zamzarina, Khokhar, Rashid Hafeez, Md Sap, Mohd Noor

    Published 2004
    “…Generally our clustering algorithm consists of two steps including training and running steps.The training step is conducted for generating the neural network knowledge based on clustering.In running step, neural network knowledge based is used for supporting the Module in order to generate learned complete data, transformed data and interesting clusters that will help to generate interesting rules.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Car plate recognition system : (segmentation) by Nor Helmy Effendy, Meon

    Published 2005
    “…In the research,One Pass Thinning algorithm and Partial Segmentation algorithm are the algorithms being applied.For each phase,the used technique produces quite a good result whereby it is to be discussed in detail in the thesis.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin by Nasaruddin, Syazwani

    Published 2017
    “…In this step, user hear the speech and used the hand labelling method discuss in chapter 2. …”
    Get full text
    Get full text
    Thesis