Search Results - (( java implementation mining algorithm ) OR ( using personal process algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Pengesan lalu lintas dengan kaedah pemerosesan imej by Riza Atiq O.K.Rahmat, Kasmiran Jumari, Azmi Hassan, Hassan Basri

    Published 2001
    “…This study was conducted to develop efficient traffic detector using image-processing with a personal compute I: Traffic images were captured using ordinary analogue video camera and digitised using a video blastel: Four algorithms were developed i. e. algorithm for traffic counting, algorithm for vehicle classification. algorithm to determine the speed of the counted vehicles and algorithm for incident detection. …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Parallel Kalman filter-based multi-human tracking in surveillance video by Yussiff, A.-L., Yong, S.-P., Baharudin, B.B.

    Published 2014
    “…A novel approach to robust and flexible person tracking using an algorithm that integrates state of the arts techniques; an Enhanced Person Detector (EPD) and Kalman filtering algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Overhead view based person counting using deep learning by Kaw, Chee Zhao

    Published 2022
    “…Third, the accurate tracking of each detected person is performed using the deep learning based tracking framework, known as DeepSORT. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Eeg-Based Person Identification Using Multi-Levelwavelet Decomposition With Multi-Objective Flower Pollination Algorithm by Yahya Alyasseri, Zaid Abdi Alkareem

    Published 2020
    “…For addressing these points, a novel person identification method that is using EEG with multi-level wavelet decomposition and multi-objective flower pollination algorithm is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Efficient document retrieval system using locality sensitive hashing nearest neighbor algorithm and weighted jaccard distance for retrieving closest personalities by SE. Ben Georgea, G. Jeba Rosline, N. Balasupramanian, N.R. Wilfred Blessing

    Published 2024
    “…The personality document search results were compared for different distance measures using performance metrics like Normalized Discounted Cumulative Gain and Mean Average Precision. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani by Abdul Ghani, Nur Syafiqah

    Published 2021
    “…In model development, Ant-Miner was used which consists of three steps. In model validation, to quantify accuracy by approving the informational collection, Ant Colony Optimization Algorithm was used and it was compared with the J48 algorithm. …”
    Get full text
    Get full text
    Student Project
  16. 16

    Web based personalized university timetable for UiTM students using genetic algorithm / Mohd Radhi Fauzan Jamli and Ahmad Firdaus Ahmad Fadzil by Jamli, Mohd Radhi Fauzan, Ahmad Fadzil, Ahmad Firdaus

    Published 2024
    “…Student input initiates the process, with user interaction allowing for timetable customization based on personal preferences. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Secondly, a questionnaire prepared to examine the acceptance and use of EPSB. Finally, the implemented algorithm tested by comparing the accuracy of the current authentication framework with and without an EPSB algorithm. …”
    text::Thesis
  18. 18

    Traffic Detectors Using Image Processing Method (Pengesan Lalu Lintas Dengan Kaedah Pemprosesan Imej) by Hassan, Azmi, Basri, Hassan, Rahmat, Riza Atiq, Kasmiran, Jumari

    Published 2001
    “…This study was conducted to develop efficient traffic detector using image-processing with a personal computer Traffic images were captured using ordinary analogue video camera and digitised using a video blaster. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Extracting feature from images by using K-Means clustering algorithm / Abdul Hakim Zainal Abidin by Zainal Abidin, Abdul Hakim

    Published 2016
    “…This research purposed clustering algorithm to improve process extracting feature in images to get meaningful information because it can speed up the time to process of extracting meaningful information in images due to the efficient of the algorithm that has high performance to process the image. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Text based personality prediction from multiple social media data sources using pre-trained language model and model averaging by Christian, Hans, Suhartono, Derwin, Chowanda, Andry, Kamal Z., Zamli

    Published 2021
    “…Termed personality prediction, the process involves extracting the digital content into features and mapping it according to a personality model. …”
    Get full text
    Get full text
    Get full text
    Article