Search Results - (( java implementation mining algorithm ) OR ( using field using algorithm ))

Refine Results
  1. 1

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms by Bundak, Caceja Elyca

    Published 2021
    “…This thesis analyses the positioning accuracy changes by using different similarity measures on a specific magnetic field vector and proposed an algorithm using different weighted magnetic field signal distance similarity measures. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Improved algorithms of elliptic curve point multiplication over binary and prime fields using elliptic net by Muslim, Norliana

    Published 2022
    “…The primary objective of this study is to improve the performance of ECPM algorithm of ECC using the elliptic net (EN) method in affine coordinate over binary and prime fields. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Text encryption using Elliptic Curve Cryptography (ECC) over binary finite field and Elgamal Cryptosyste / Ahmad Asif Bakhtiar Noor Noor Hamid, Nor Syazwani Nor Zailan and Syaza Fa... by Noor Hamid, Ahmad Asif Bakhtiar Noor, Nor Zailan, Nor Syazwani, Ishak, Syaza Farlisa

    Published 2019
    “…ECC can be perfonn by using either finite field or binary field. Text encryption using ECC over bina1y finite ticld, G/(2"' ) has more advantage than Ctnitc field, Gf(p) but the previous study that use ECC and EIGamal for text encryption only represent the system using Gf(p). …”
    Get full text
    Get full text
    Student Project
  11. 11
  12. 12

    Development of some fast and efficient methods for elliptic curve scalar multiplication over prime fields by Al-Saffar, Najlae Falah Hameed

    Published 2015
    “…The proposed algorithm using NAF to represent the scalar in ECSM reduced the cost of computation of the ECSM by comparing with using the binary and NAF algorithm respectively. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Inverse problem: comparison between linear back-projection algorithm and filtered back-projection algorithm in soft-field tomography by Yasmin, Abdul Wahab, Ruzairi, Abdul Rahim, Fazalul, Rahiman, Suzzana, Ridzuan Aw, Fazlul Rahman, Mohd Yunus, Jaysuman, Pusppanathan, Nor Muzakkir , Nor Ayob, Leow, Pei Ling

    Published 2017
    “…The objectives of this paper are: (1) to compare the result from LBP and FBP algorithm in soft-field tomography, and (2) to investigate the effect of FBP algorithm to a reconstructed image in soft-field tomography. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16
  17. 17

    New algorithm for evaluation of electric fields due to indirect lightning strike by Izadi, Mahdi, Ab Kadir, Mohd Zainal Abidin

    Published 2010
    “…In addition, this proposed algorithm can also be used to evaluate the effect at the far distance cases of observation point from lightning channel.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Evaluation of Lightning Current Using Inverse Procedure Algorithm. by Ab Kadir, Mohd Zainal Abidin, Izadi, Mahdi, Askari, Mohamad Tolou, Hajikhani, Maryam

    Published 2013
    “…In this study an inverse procedure algorithm is proposed in the time domain to evaluate lightning return stroke current based on measured electromagnetic fields at an observation point. …”
    Get full text
    Get full text
    Article
  20. 20

    The improvement of Item-based collaborative filtering algorithm in recommendation system using similarity index by Yao, Ma

    Published 2022
    “…The performance of enhanced algorithm was compared to existing collaborative filtering algorithms in term of precision rate, recall rate and F1 score using Movielens dataset. …”
    Get full text
    Get full text
    Get full text
    Thesis