Search Results - (( java application system algorithm ) OR ( based interactions mining algorithm ))

Refine Results
  1. 1

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…Since rerunning mining algorithms from scratch is very costly and time-consuming, researchers have introduced interactive mining of frequent patterns. …”
    Get full text
    Get full text
    Article
  2. 2

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Moreover, this study introduces a mining algorithm called PC-miner to mine the mining model frequently with various values of minsup. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Combining object-based classification and data mining algorithm to classify urban surface materials from worldview-2 satellite image by Hamedianfar, Alireza, Mohd Shafri, Helmi Zulhaidi

    Published 2014
    “…In this study, Data Mining was performed using C4.5 algorithm to select the appropriate attributes for object-based classification. …”
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6
  7. 7
  8. 8

    Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng by Cheong, Dianne L.M., Sia Abdullah, Nur Atiqah

    Published 2006
    “…Inference can be made both from writing style and from clues hidden in the posting data. A text-mining algorithm was designed to detect gender deception based on gender-preferential features at the word or clause level of Malaysian e-mail users. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Rayner Alfred, Loo Yew Jie, Joe Henry Obit, Yuto Lim, Haviluddin Haviluddin, Azreen Azman

    Published 2021
    “…Social media mining is the process of collecting large datasets from user-generated content and extracting and analyzing social media interactions to recognize meaningful patterns in individual and social behavior. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Social media mining: a genetic based multiobjective clustering approach to topic modelling by Alfred, Rayner, Loo, Yew Jie, Obit, Joe Henry, Lim, Yuto, Haviluddin, Haviluddin, Azman, Azreen

    Published 2021
    “…Social media mining is the process of collecting large datasets from user-generated content and extracting and analyzing social media interactions to recognize meaningful patterns in individual and social behavior. …”
    Get full text
    Get full text
    Article
  11. 11

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12
  13. 13

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  14. 14
  15. 15
  16. 16
  17. 17

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
    Get full text
    Get full text
    Thesis
  20. 20

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item