Search Results - (( java implementation during algorithm ) OR ( knowledge identification pattern algorithm ))
Search alternatives:
- knowledge identification »
- identification pattern »
- implementation during »
- java implementation »
- pattern algorithm »
- during algorithm »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Identification model for hearing loss symptoms using machine learning techniques
Published 2014“…The model is implemented using both unsupervised and supervised machine learning techniques in the form of Frequent Pattern Growth (FP-Growth) algorithm as feature transformation method and multivariate Bernoulli naïve Bayes classification model as the classifier. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Discovering association rules for mining images datasets: a proposal
Published 2005“…Finally, the association rules will determine using an adaptation of the Apriori Algorithm. The proposed approach is applied to an image datasets to demonstrate the kinds of knowledge and association rules to discover interesting patterns and new knowledge. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Feature selection for Malaysian medicinal plant leaf shape identification and classification
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
7
Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid
Published 2024“…This study underscores the CNN algorithm's viability for accurate rabbit breed identification. …”
Get full text
Get full text
Thesis -
8
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…The second component is the search process that is operated by a pattern matching. The third process is the parsing that is operated by a text mining algorithm. …”
Article -
9
APPLICATION OF LINK GRAMMAR IN SEMI-SUPERVISED NAMED ENTITY RECOGNITION FOR ACCIDENT DOMAIN
Published 2011“…In our research, extraction pattern from the first module will be fed to this algorithm and is used to make the prediction of named entity candidate category. …”
Get full text
Get full text
Thesis -
10
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Most sophisticated methods in data mining address this problem to some extent, but not fully, and can be improved by addressing the problem more directly. The identification of outliers can lead to the discovery of unexpected knowledge in areas such as credit card fraud detection, calling card fraud detection, discovering criminal behaviors, discovering computer intrusion, etc. …”
Get full text
Get full text
Conference or Workshop Item -
11
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
12
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). The third stage is to classify individual jammers according to the specific pattern and characteristics design as defined in jamming identification and classification parameters. …”
Get full text
Get full text
Thesis -
13
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
15
-
16
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
17
The conceptual framework of knowledge of large scale and incomplete graphs of skyline queries optimization using machine learning
Published 2025“…The preliminary results using the K means Clustering Algorithm showed that the conceptual framework successfully grouped similar data points, facilitating the identification of skyline points. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
Fuzzy-based classifier design for determining the eye movement data as an input reference in wheelchair motion control
Published 2015“…Since membership functions (MFs) are generated automatically, the proposed fuzzy learning algorithm can be viewed as a knowledge acquisition tool for classification problems. …”
Get full text
Get full text
Get full text
Article -
20
All-in-1 adverse drug reaction reporting system / Long Chiau Ming … [et al.]
Published 2014“…An ADR was considered preventable if it was avoidable by any means currently available unless that means was not considered standard care. The identification of ADR requires knowledge of the pharmacological and pharmacokinetics knowledge of the drugs used. …”
Get full text
Get full text
Get full text
Book Section
