Search Results - (( java implementation mining algorithm ) OR ( using advanced process algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari by Mohammad Zahari, Mohamad Zakirin

    Published 2014
    “…This will help to speed up the algorithm because mix column step was using high calculation and needs a lot of time to process it. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Formulation of model predictive control algorithm for nonlinear processes by Mohd. Yusof, Khairiyah, Hassim, Mimi Haryani, Tan, Sook Li, Ab. Rashid, Siti Rafidah

    Published 2004
    “…However, with faster computing technology, the industry is now demanding a tighter advanced control strategy. To fulfil all these objectives, Model Predictive Control (MPC), an optimal model based control algorithm is definitely the best choice among all the advanced control algorithms available to date. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Design and implementation of advanced encryption standard using verilog HDL by Shamsiah, Suhaili, Fredrick, Rene Brooke, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2022
    “…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Ground receiving station reference pair selection technique for a minimum configuration 3D emitter position estimation multilateration system by Yaro, A.S., Sha’Ameri, A.Z., Kamel, N.

    Published 2017
    “…The Position Estimation (PE) accuracy of the lateration algorithm depends on several factors which are the TDOA estimation error, the lateration algorithm approach, the number of deployed GRSs and the selection of the GRS reference used for the PE process. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time by Mohd Ariffin, Noor Afiza, Ahmed Ashawesh, Aymen Yousef

    Published 2021
    “…This paper propose a Secured Modified Advanced Encryption Standard Algorithm with decreasing the rounds of Advanced Encryption Standard (AES) to 14 rounds in order to minimize encryption and decryption process time and increasing digital data security as well. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Design and Implementation of Advanced Encryption Standard Using Verilog HDL by Shamsiah, Suhaili, Rene Brooke, Fredrick, Zainah, Md. Zain, Norhuzaimin, Julai

    Published 2020
    “…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A DNA-dynamic permutation-diffusion algorithm for image encryption using scaling chaotification models and advanced DNA operations by Alkawsi, Gamal, Khairullah, Mustafa Kamil, Baharuddin, Mohd Zafri, Thabit, Reema, Alomari, Mohammad Ahmed, A. Saif, Faten

    Published 2025
    “…To overcome these challenges, this paper proposes the DNA-Dynamic Concurrent Permutation-Diffusion Algorithm (DNA-DCP-DA), which introduces four advanced encryption mechanisms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Gaze Tracking Algorithm Using Night Vision Camera by Abdullah, Abdul Rahim, Ahmad Izzuddin, Tarmizi, Jali, Mohd Hafiz, Sudirman , Rubita

    Published 2018
    “…Two image processing algorithms are then used, each with owns tradeoff between speed and accuracy.Analysis on both algorithms shows good tracking performance despite of the mentioned tradeoff.…”
    Get full text
    Get full text
    Get full text
    Article