Search Results - (( java implementation mining algorithm ) OR ( programming program writing algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences by UiTM, Faculty of Computer And Mathematical Sciences

    Published 2023
    “…This course is an introduction to problem solving using a computer programming language. It emphasizes on algorithm development and writing computer programs, as well as common good practices in writing programs. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language by Jano, Zanariah, Omar, Norliza, Nazir, Faridah

    Published 2019
    “…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Algorithm as a problem solving technique for teaching and learning of the Malay language by Nazir, Faridah, Jano, Zanariah, Omar, Norliza

    Published 2019
    “…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Algorithm as a problem solving technique for teaching and learning of the Malay language by Faridah Nazir, Zanariah Jano, Norliza Omar

    Published 2019
    “…The students were to arrange the basic words into grammatical sentences based on the scratch program and write a cake recipe using an algorithmic technique, a series of instructions contained in the scratch program. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Analyzing students’ experience in programming with computational thinking through competitive, physical, and tactile games: The quadrilateral method approach by Habib, M. A. a, Raja-Yusof, R. -J., Salim, S. S.a, Sani, A. A. a, Sofian, H., Abu Bakar, A.

    Published 2021
    “…The CT elements in this research focus on four major programming concepts, which are decomposition, pattern recognition, abstraction, and algorithmic thinking. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Genetic algorithm based for optimizing filter design / Rohana Awang Ahmed by Awang Ahmed, Rohana

    Published 2000
    “…The conventional filter design technique is adapted in writing a MATLAB program using the Signal Processing Toolbox. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Vision-based robot indoor navigation by Teo, Zhin Hang

    Published 2022
    “…NodeRed links both processing units together. An algorithm is developed in the computer to achieve image processing, user input, path planning, simulation, and writing of output files. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14

    Pattern extraction for programming performance evaluation using directed apriori by Mohamad Mohsin, Mohamad Farhan, Zaiyadi, Mohd Fairuz, Md Norwawi, Norita, Abd Wahab, Mohd Helmy

    Published 2009
    “…Computer programming is taught as a core subject in Information Technology related studies.It is one of the most essential skills which each student has to acquire.However, there is still a small number of students who are unable to write a program well. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Enhancing programming language learning with 3D game-based programming for MSU students: codadventure / Abdullah Adib Aditia Wirawan and Nur Suhana Mohd Redzo by Aditia Wirawan, Abdullah Adib, Mohd Redzo, Nur Suhana

    Published 2024
    “…The students face challenges while learning programming languages and memorizing programming concepts. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    An investigation into influence factor of student programming grade using association rule mining by Mohamad Mohsin, Mohamad Farhan, Abd Wahab, Mohd Helmy, Zaiyadi, Mohd Fairuz, Hibadullah, Cik Fazilah

    Published 2010
    “…Computer programming is one of the most essential skills which each graduate has to acquire.However, there are reports that they are unable to write a program well. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Fault detection with optimum March Test Algorithm by Zakaria, Nor Azura, Wan Hasan, Wan Zuha, Abdul Halin, Izhal, Mohd Sidek, Roslina, Wen, Xiaoqing

    Published 2012
    “…This paper analyzes MATS++(6N), March C-(10N), March SR(14N), and March CL(12N) test algorithms and shows that they cannot detect either Write Disturb Faults (WDFs) or Deceptive Read Destructive Faults (DRDFs) or both. …”
    Get full text
    Conference or Workshop Item
  19. 19

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. …”
    Get full text
    Get full text
    Student Project
  20. 20

    Practical cryptography: algorithms and implementations using C++

    Published 2014
    “…Some books that include cryptographic algorithms with practical programming codes are by this time (i.e., at the preparation of this book) outdated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Book