Search Results - (( java implementation mining algorithm ) OR ( basic using data algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Design Of Robot Motion Planning Algorithm For Wall Following Robot by Ali Hassan, Muhamad Khairul

    Published 2006
    “…Computer B will send the data to the BASIC Stamp and the BASIC Stamp will check their program. …”
    Get full text
    Get full text
    Monograph
  9. 9

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…E-Leaming is one of the Web based application where it will facing with large amount of data. In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…E-Learning is one of the Web based application where it will facing with large amount of data. In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Data depublication using : Hashing algorithm / Naimah Nayan by Nayan, Naimah

    Published 2019
    “…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
    Get full text
    Get full text
    Thesis
  15. 15

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
    Get full text
    Get full text
    Student Project
  16. 16

    A network based fetal ECG monitoring algorithm by Ibrahimy, Muhammad Ibn, Hasan , M. A., Motakabber, S. M. A.

    Published 2011
    “…The hardware part is developed for abdominal Electrocardiography (AECG) data acquisition system. Individual algorithms and customized application software are developed using Visual Basic for both the networking and Fetal Heart Rate (FHR) monitoring systems. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)... by Pradhan, Biswajeet, Mohammad Zare, Pourghasemi, Hamid Reza, Vafakhah, Mahdi

    Published 2013
    “…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
    Get full text
    Get full text
    Article
  18. 18

    Ciphercrypt-an Encryption System / Nor Hidayah Ngah by Nor Hidayah, Ngah

    Published 2004
    “…The hashed keyword will be used in encrypt / decrypt process by using any of 3 encryption algorithm mentioned before. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin by Engku Safruddin, Engku Maryam Syahdina

    Published 2018
    “…In order to ensure the image data is secure/ protected and encryption time is low, it is very timely to conduct a research on image encryption and decryption using 3D-AES block cipher algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Control of Omni-Directional Mecanum wheel mobile Robot and analysis of Artificial Muscle by Mohamedd Rizon, Mohamed Juhari, Prof Madya Dr., Jefri Efendi, Mohd Salih, Mohammad Hanif, Abdul Hamid

    Published 2009
    “…Basic mobility algorithm using BasicStamp software was developed to test the basic mobility capabilities and test the qualitative view of the system's mobility performance. …”
    Get full text
    Article