Search Results - (( java application sensor algorithm ) OR ( management implementation mining algorithm ))
Search alternatives:
- implementation mining »
- application sensor »
- java application »
- sensor algorithm »
- mining algorithm »
-
1
Comparative study of apriori-variant algorithms
Published 2016“…One of data mining methods is frequent itemset mining that has been implemented in real world applications, such as identifying buying patterns in grocery and online customers’ behavior.Apriori is a classical algorithm in frequent itemset mining, that able to discover large number or itemset with a certain threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
-
3
ANALYSIS OF CUSTOMER SERVICE BUSINESS PROCESS USING DATA MINING
Published 2020“…In this report, data mining as a data analysis tool will be implemented to extract the information and hidden knowledge to enhance the decision-making process for better management of resources. …”
Get full text
Get full text
Final Year Project -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
5
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…Database or data warehouse is rich with hidden information that can be used to provide intelligent decision using data mining technique. Data mining is a widely used approach for knowledge discovery in machine learning. …”
Get full text
Get full text
Research Reports -
6
A novel approach to data mining using simplified swarm optimization
Published 2011“…Meanwhile, SSO-WLS has been implemented in Anomaly-based Network Intrusion Detection System (A-NIDS). …”
Get full text
Get full text
Thesis -
7
Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak
Published 2018“…This research implement unsupervised data mining approach to analyse the network traffic trend of BSIS. …”
Get full text
Get full text
Thesis -
8
Intuitive content management system via manipulation and duplication with if-else rules classification
Published 2018“…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
Get full text
Get full text
Thesis -
9
Analysis using data mining techniques: the exploration and review data of diabetes patients / Syarifah Adilah Mohamed Yusoff ... [et al.]
Published 2025“…Therefore, it is advisable for future studies to implement robust classification algorithms, such as ensemble methods, to effectively manage and extract potential insights.…”
Get full text
Get full text
Get full text
Article -
10
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
11
-
12
-
13
-
14
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…Furthermore, the study emphasizes the potential of data-driven traffic management and accident prevention approaches. By incorporating modern data mining techniques, stakeholders can transition from traditional data recapitulation to predictive analytics, enabling proactive measures for public safety. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
Article -
17
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Researchers have identified three categories of blockchain-based potential solutions for the management of electronic health records: conceptual, prototype, and implemented. …”
Get full text
Get full text
Get full text
Article -
18
Intrusion detection system for the internet of things based on blockchain and multi-agent systems
Published 2020“…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis
Published 2017“…In conclusion, developed SDM model is recommended for long-term planning of solid waste management and to produce suitability maps for new landfill sites.…”
Get full text
Get full text
Thesis -
20
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Researchers have identified three categories of blockchain-based potential solutions for the management of electronic health records: conceptual, prototype, and implemented. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article
