Search Results - (( java implementation mining algorithm ) OR ( ((using code) OR (using mobile)) using algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- using algorithm »
- using code »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
4
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The QR code was used as a mechanism to activating the function for mobile application and determining the location, while EAN-13 barcode was used as a product identification. …”
Get full text
Get full text
Thesis -
5
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
6
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
7
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The optimization on ANPR was performed on the pre-processing step using our own Java code as currently there is no image processing library available on the standard Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
8
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…XSS-DETREM has been evaluated empirically using a data set of JSP and Android web applications that have been used in previous studies. …”
Get full text
Get full text
Get full text
Thesis -
10
Artificial intelligent power prediction for efficient resource management of WCDMA mobile network
Published 2023“…The output of SVR will be used by WCDMA mobile network to decide on new service admission. …”
Conference Paper -
11
Systematic Analysis on Mobile Botnet Detection Techniques Using Genetic Algorithm
Published 2024“…Furthermore, this paper also discusses the challenges and the potential research for future work with relate of the genetic algorithm. This research paper can be used as a reference and guidance for further study on mobile botnet detection techniques.…”
Proceedings Paper -
12
PAPR and BER analysis of mobile WiMAX system using QC-LDPC code with STFBC MIMO OFDMA system / Siti Nor Hasima Mat Jusoh
Published 2014“…Th e main diversity type is space, time and frequency. MATLAB software is use to develop new Quasi Cyclic LDPC block code algorithm and determine PAPR reduction for the STFBC MIMO-OFDMA system. …”
Get full text
Get full text
Thesis -
13
Systematic analysis on mobile botnet detection techniques using genetic algorithm
Published 2024Conference Paper -
14
Error performance in BCH codes / Zurina Mohamed
Published 2003“…This thesis covers the theoretical and the practical design of the BCH codes. The theoretical part covers the algorithms used, how they are encoded and decoded and how they are used to correct errors. …”
Get full text
Get full text
Thesis -
15
Mobile app of mood prediction based on menstrual cycle using machine learning algorithm / Nur Hazirah Amir
Published 2019“…The template design was built using Node.js and Visual Code Studio. And it used Cordova for designing interface. …”
Get full text
Get full text
Thesis -
16
Improving the security of mobile IPV6 signalling using KECCAK / SHA-3
Published 2021“…The conventional IPsec uses Keyed-Hash Message Authentication Code-Secure Hash Algorithm-1 (HMAC-SHA-1) to authenticate signalling messages. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Simulation of handoff algorithm for NDN producer’s mobility
Published 2020“…In this paper, producer’s mobility between two points is set-up for simulation using hard handoff technique. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Implementation of RBG-HS-CbCr skin colour model using mobile python PyS60
Published 2009“…The programming language used in this project is Mobile Python or PyS60 and the written source code is executed on the S60 device mobile platform, whic h is the Nokia N95 in this case. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
19
Hybrid artificial intelligent algorithm for call admission control in WCDMA mobile network
Published 2023“…The predicted output is used by WCDMA mobile network to make decision on new service request admission. …”
Conference paper -
20
PID controller design for a twin rotor MIMO system using real coded GA optimisation
Published 2009“…This paper presents a scrutinized investigation to control the rigid body motion of a laboratory scale helicopter, a twin rotor multi input multi output system (TRMS), using PID control. The controller is optimized using a real-coded genetic algorithm (GA). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
