Search Results - (( java implementation mining algorithm ) OR ( pattern line efficient algorithm ))

  • Showing 1 - 19 results of 19
Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Comparative analysis of line search methods in the Steepest Descent algorithm for unconstrained optimization problems / Ahmad Zikri Shukeri, Puteri Qurratu Ain Megat Sulzamzamendi... by Shukeri, Ahmad Zikri, Megat Sulzamzamendi, Puteri Qurratu Ain, Ibrahim, Suhaida

    Published 2024
    “…The result from this study is choosing FMRI algorithm using exact line search to get faster convergence rate which means that the algorithm achieves a high level of accuracy in fewer iterations compared to using other algorithms and inexact line search.…”
    Get full text
    Get full text
    Student Project
  9. 9

    Hilbert-peano and zigzag: Two approaches mapping pattern of digital watermarking for text images authentication by 'Aqilah, Abd. Ghani, Syifak Izhar, Hisham, Nurul Wahidah, Arshad

    Published 2021
    “…There are various methods for watermark embedding, which mapping pattern is one of them. The aim is to validate and compare the SCAN pattern for digital watermarking in order to produce a fast and efficient authentication algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Comparison on queuing performance measures on customer’s flow using Queuing Theory Model and DSW Algorithm / Muhammad Izuanudin Azmi ... [et al.] by Azmi, Muhammad Izuanudin, Azizul, Muhamad Aiman Zulhaikal, Abd Razak, Nurul Aisyah, Mohd Zaki, Noor Hidayah

    Published 2023
    “…Business owners can gain an understanding of customer flow by analysing flow patterns. Queuing theory is an area of mathematics concerned with the study and modelling the behaviour of waiting in lines (Whiting,2012). …”
    Get full text
    Get full text
    Article
  11. 11

    Pengesanan minutiae imej cap jari berskala kelabu menggunakan algoritma susuran batas by Sulong, Siti Masrina

    Published 2002
    “…Thus, Maio and Maltoni (1997) proposed a method to detect minutiae in gray scale fingerprint images based on ridge line following algorithm, which is to trail the ridge line according to the fingerprint directional image. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Autonomous flight algorithm of a quadcopter sensing system for methane gas concentration measurements at landfill site by Bashi, Omar Ibrahim Dallal

    Published 2018
    “…This algorithm was proposed in this thesis based on a special mathematical calculation model, which has the ability to decide the spacing between adjacent straight-line trajectories within a user defined area, this prevents the quadcopter from crashing during the survey due to reasons of overcapability. …”
    Get full text
    Get full text
    Thesis
  13. 13

    DeepIoT.IDS: Hybrid deep learning for enhancing IoT network intrusion detection by A. Mostafa, Salama, Al-Azzawi, Ziadoon Kamil Maseer, Bahaman, Nazrulazhar, Yusof, Robiah, Musa, Omar, Al-rimy, Bander Ali Saleh

    Published 2021
    “…Recently, researchers have suggested deep learning (DL) algorithms to define intrusion features through training empirical data and learning anomaly patterns of attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Efficient hardware design for palm-dorsa vein image enhancement by Jusoh@Yusoff, Suhaimi Bahisham

    Published 2018
    “…Vein biometric system uses the pattern of veins in the human body as a unique identification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Trajectory Tracking Of A Mobile Robot System by Md Ghazaly, Mariam, Abdullah, Zulkeflee, Md Ali, Mohd Amran, Che Amran, Aliza, Chong, Shin Horng

    Published 2017
    “…In conclusion, the experimental results show that the mobile robot able to reach the target destination successfully without the collision with obstacles, for different types of trajectory patterns using the masking tape width of 18mm with the develop algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Trajectory tracking of a mobile robot system / Mariam Md Ghazaly...[et al.] by Md Ghazaly, Mariam, Soo, Kok Yew, Abdullah, Zulkeflee, Mohd Ali, Mohd Amran, Chong, Shin Horng, Che Amran, Aliza

    Published 2017
    “…In conclusion, the experimental results show that the mobile robot able to reach the target destination successfully without the collision with obstacles, for different types of trajectory patterns using the masking tape width of 18mm with the develop algorithm.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Handwriting Recognition Using Artificial Neural Network by Goh , Siew Yin

    Published 2004
    “…This network is trained using the Back-Propagation algorithm to identify similarities and patterns among different handwriting samples. …”
    Get full text
    Get full text
    Final Year Project
  19. 19

    Coil geometry models for power loss analysis and hybrid inductive link for wireless power transfer applications by Nataraj, Chandrasekharan, Khan, Sheroz, Habaebi, Mohamed Hadi

    Published 2018
    “…Then, WPT system is demonstrated with the inclusion of Maximum Power Point Tracking algorithm for improving efficiency. The schematic of flux generation of both in the transmitter and receiver sections are demonstrated and analyzed graphically. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article