Search Results - (( java implementation mining algorithm ) OR ( program usage generation algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis by Arif Mandangan, Muhammad Asyraf Asbullah, Syed Farid Syed Adnan, Mohammad Andri Budiman

    Published 2024
    “…The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis by Mandangan, Arif, Asbullah, Muhammad Asyraf, Adnan, Syed Farid Syed, Budiman, Mohammad Andri

    Published 2024
    “…The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10
  11. 11

    Optimizing tree planting areas through integer programming and improved genetic algorithm by Md Badarudin, Ismadi

    Published 2012
    “…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Elitist hybrid migrating birds optimization and genetic algorithm based strategy for T-way test suite generation by Hasneeza Liza, Zakaria

    Published 2020
    “…Therefore, this study concludes that that Elitist Hybrid MBO-GA is a useful strategy for generating t-way test suite generation.…”
    Get full text
    Get full text
    Thesis
  13. 13

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Cognitive selection mechanism performance in IEEE 802.11 WLAN by Hashim, Wahidah, Ismail, Ahmad Fadzil, Ghafar, Nadratul, Dzulkifly, Sumayyah

    Published 2013
    “…Recent growth in Wireless Local Area Network (WLAN) usage has generated considerable interest in the establishment of the IEEE 802.11 WLAN standards. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Hybridization solution of electrical energy demand response and forecasting program by using PSO-LSSVM technique by Ali, Amira Noor Farhanie, Sulaima, Mohamad Fani, Tahir, Musthafah Mohd., Razak, Intan Azmira Wan Abdul, Kadir, Aida Fazliana Abdul, Rahman, Zulkifli Ab.

    Published 2023
    “…The proposed formulation of the ETOU optimization achieves an energy cost savings of up to 7.57% (PSO) and 7.98% (PSO-LSSVM), and the proposed models are intended to lower the cost of electrical energy usage across all price ranges. The study's findings will assist manufacturers in transitioning to the ETOU tariff and contribute to the national DSM initiative program. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Optimization Of Twofish Encryption Algorithm On FPGA by Raja, Ananda Raja Dore, Zain Ali, Noohul Basheer, Hussin, Fawnizu Azmadi

    Published 2005
    “…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. …”
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework by Wan Nor Ashiqin Wan Ali, Wan Ahmad Jaafar Wan Yahaya

    Published 2022
    “…Learning about computer science not only helps students to create programs, applications or how to handle devices, but strengthens the practise of Computational Thinking (CT). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Resource allocation techniques for downlink Non-Orthogonal Multiple Access-Based 5G wireless systems by Ali, Zuhura Juma

    Published 2021
    “…The results show that the femtocell user’s minimum energy efficiency by applying NOMA with power allocation method using Sequential Convex Programming and user pairing based on Greedy Algorithm (NOMA-SCP-GA) is higher by 38.22 %, 58.84 %, and 76.39 % compared to NOMA-DC, NOMA-FTPA, and OFDMA methods respectively. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar by Abu Bakar, Nordin

    Published 2016
    “…The central part of this subject is described in terms of frameworks or algorithms that explains how to achieve better performance. …”
    Get full text
    Get full text
    Thesis