Search Results - (( model validation protocol algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Routine insulin sliding scale protocol versus software driven algorithm (star protocol) for blood glucose management of critically ill patients in the ICU: A prospective observatio... by Tan, Ru Yi

    Published 2018
    “…The data collected was subsequently simulated with the software driven algorithm (STAR protocol) and results were analysed to determine if it was better at maintaining blood glucose levels within set targets of 6-10 mmol/L. …”
    Get full text
    Get full text
    Thesis
  8. 8

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…Validation of the algorithm via the “OPNET” modeler suite software simulation results analysis is also to be carried out to define the best gateway for mapping process. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…Validation of the algorithm via the “OPNET” modeler suite software simulation results analysis is also to be carried out to define the best gateway for mapping process. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…The communications domain has utilized the implementation of protocols for a wide spectrum of applications. This encompasses Medium Access Control (MAC) protocols. …”
    Get full text
    Get full text
    Article
  11. 11

    An Electrocardiogram-Based Authentication Protocol In Wireless Body Area Network by Ramli, Sofia Najwa

    Published 2016
    “…To validate the proposed ECG-based authentication protocol model, the FAR and FRR analysis is done and then followed by the complexity analysis. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive medium access control protocol for dynamic medical traffic with quality of service provisioning in wireless body area network by Mohd Ali, Darmawaty, Wan Hassan, Wan Haszerila, Sarang, Sohail, M. Stojanović, Goran, Wan Muhamad, Wan Norsyafizan, Ya'acob, Norsuzila

    Published 2024
    “…Additionally, an M/M/1 queuing algorithm with a non-preemptive priority is modeled using SimEvents in MATLAB to validate the packet delay of the priority queues. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A new particle swarm optimization for wireless mesh routing protocol by Abd. Rahman, Tharek

    Published 2008
    “…Among proactive protocols in wireless mesh networks (WMNs), OLSR has been chosen mainly because it is a link state type protocol that guarantees better performances and a better network control than distance-vector protocol. …”
    Get full text
    Monograph
  15. 15

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design by Shamsiah, Suhaili, Norhuzaimin, Julai, Rohana, Sapawi, Nordiana, Rajaee

    Published 2024
    “…This article analyses a fast implementation of the Hash-based Message Authentication Code (HMAC), which uses its algorithm to ensure the validity and integrity of data to optimise hardware efficiency and design efficacy using the SHA-256 algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Adaptive Medium Access Control (ADT-MAC) Protocol for Dynamic Medical Traffic with Quality of Service (QoS) provisioning in Wireless Body Area Network (WBAN) by Wan Hassan, Wan Haszerila

    Published 2025
    “…Additionally, an M/M/l queuing algorithm with a non-preemptive priority is modeled using SimEvents in MATLAB to validate the packet delay of different priority queues. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A self-adaptive agent-based simulation modelling framework for dynamic processes by Ling, Loo Yim, Dr.

    Published 2023
    “…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. Self-adaptive simulation algorithms were formulated to enable the model’s adaptive capability. …”
    text::Thesis
  20. 20

    Enhancing pineapple cultivar classification: a framework for image quality, feature extraction, and algorithmic refinement by Ab Jabal, Mohamad Faizal, Rozlan, Muhammad Irfan, Suhaimi, Azrina, Hasmy, Harshida

    Published 2025
    “…Future work will emphasise empirical validation and the deployment of the YOLOv7 model for real-time, on-site assessment of fruit maturity in field conditions. …”
    Get full text
    Get full text
    Get full text
    Article