Search Results - (( java implementation mining algorithm ) OR ( changes using normalization algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Widely linear dynamic quaternion valued least mean square algorithm for linear filtering by Mohammed, Aldulaimi Haydar Imad

    Published 2017
    “…The new adaptive algorithm is called dynamic quaternion least mean square algorithm (DQLMS) because of the normalization process of the filter input and the variable step-size. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Fire severity and post-fire generation using : Landsat [NDVI], [NBR] and [SAVI] / Nur Izzaty Dali by Dali, Nur Izzaty

    Published 2018
    “…Pre-fire and post-fire of Landsat 7 ETM+ images were obtained to identify the fire severity using Normalized Burn Ratio algorithms. The objectives of this study are (1) to produce Normalized Difference Vegetation Index (NDVI), Normalized Burn Ratio (NBR), and Soil Adjusted Vegetation Index (SAVI) and (2) to determine the changes of forest distribution based on NDVI, NBR and SAVI changes. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms by Zahid, Aafaq

    Published 2015
    “…It is concluded that the resultant hybrid techniques can perform well if the variables provided to normalization by neighborhood model (MF and CF) do not have big differences in order for the hybrid normalization model to outperform every algorithm in comparison.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…The experimental tests of the proposed algorithm have shown that the reduction percentage in the MSE output using the proposed algorithm is 51% compared to the NLMS algorithm and 61% compared to the RLS algorithm. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Abnormal data detection model based on autoencoder and random forest algorithm: camera sensor data in autonomous driving systems by Shengwen, Geng, Osman, Mohd Hafeez

    Published 2025
    “…The proposed method will use convolutional autoencoders to calculate the reconstruction error and combine the hidden features extracted by the encoder as the input of the random forest to distinguish normal data from abnormal data. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…Then the next step was to test the mitigation algorithm, the same above scenarios of attack were repeated and the entropy change after the mitigation was observed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Capture and estimate the speed of the object for remote monitoring / Nor Sajidah Ab Ghani by Ab Ghani, Nor Sajidah

    Published 2016
    “…The optical flow used Kanade Lucas Algorithm method to track the vehicle movement in the video. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Application of weighted average on modal parameters for damage detection algorithms: Case study on steel beam by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…Dynamic algorithms were compared to the change in the flexural rigidity as based on the change in the second moment of inertia of the beam cross-section at the crack zone. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Weighting method for modal parameter based damage detection algorithms by Fayyadh, M.M., Abdul Razak, H.

    Published 2011
    “…Normally, there is a variance in the sensitivity of different modes and the global stiffness change is derived by taking the algebraic average, which is equivalent to the mean in statistical analysis terms. …”
    Get full text
    Get full text
    Article
  20. 20

    Deforestation detection in Kinabalu Area, Sabah, Malaysia by using multi-sensor remote sensing approach by Phua, Mui How, Tsuyuki, Satoshi

    Published 2004
    “…The accuracy of detection was satisfactory that the algorithm was used in deforestation detection of the whole study area in two change periods i.e. …”
    Get full text
    Get full text
    Get full text
    Article