Search Results - (( java implementation during algorithm ) OR ( management implementation mining algorithm ))
Search alternatives:
- implementation during »
- implementation mining »
- java implementation »
- during algorithm »
- mining algorithm »
-
1
Comparative study of apriori-variant algorithms
Published 2016“…One of data mining methods is frequent itemset mining that has been implemented in real world applications, such as identifying buying patterns in grocery and online customers’ behavior.Apriori is a classical algorithm in frequent itemset mining, that able to discover large number or itemset with a certain threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
3
-
4
ANALYSIS OF CUSTOMER SERVICE BUSINESS PROCESS USING DATA MINING
Published 2020“…In this report, data mining as a data analysis tool will be implemented to extract the information and hidden knowledge to enhance the decision-making process for better management of resources. …”
Get full text
Get full text
Final Year Project -
5
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…Database or data warehouse is rich with hidden information that can be used to provide intelligent decision using data mining technique. Data mining is a widely used approach for knowledge discovery in machine learning. …”
Get full text
Get full text
Research Reports -
6
A novel approach to data mining using simplified swarm optimization
Published 2011“…Meanwhile, SSO-WLS has been implemented in Anomaly-based Network Intrusion Detection System (A-NIDS). …”
Get full text
Get full text
Thesis -
7
Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak
Published 2018“…This research implement unsupervised data mining approach to analyse the network traffic trend of BSIS. …”
Get full text
Get full text
Thesis -
8
Intuitive content management system via manipulation and duplication with if-else rules classification
Published 2018“…An ICMS is a content management system that uses three main important techniques to build, such as Manipulation method, Data Mining Prediction, and Boyer-Moore Horspool algorithm. …”
Get full text
Get full text
Thesis -
9
Analysis using data mining techniques: the exploration and review data of diabetes patients / Syarifah Adilah Mohamed Yusoff ... [et al.]
Published 2025“…Therefore, it is advisable for future studies to implement robust classification algorithms, such as ensemble methods, to effectively manage and extract potential insights.…”
Get full text
Get full text
Get full text
Article -
10
-
11
-
12
-
13
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
14
Analysis of Traffic Accident Patterns Using Association Rule Mining
Published 2024“…Furthermore, the study emphasizes the potential of data-driven traffic management and accident prevention approaches. By incorporating modern data mining techniques, stakeholders can transition from traditional data recapitulation to predictive analytics, enabling proactive measures for public safety. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The result shows that the proposed method improves the security problem of the system, the message-digest algorithm (MD5) is used to encrypt the user password, and a strict role authorisation system is designed to realise the access and manage the system�s security. � 2023 by author(s). …”
Article -
16
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
19
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
20
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…Researchers have identified three categories of blockchain-based potential solutions for the management of electronic health records: conceptual, prototype, and implemented. …”
Get full text
Get full text
Get full text
Article
