Search Results - (( process visualization mining algorithm ) OR ( java application designing algorithm ))

Refine Results
  1. 1
  2. 2

    The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment by Nanna Suryana, Herman

    Published 2007
    “…However, hyperspectral image systems produce large data sets that are not easily interpretable by visual analysis and therefore require automated processing algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH by LUONG, TRUNG TUAN

    Published 2005
    “…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7
  8. 8

    Stock price monitoring system by Ng, Chun Ming

    Published 2024
    “…Consequently, Root Mean Squared Error (RMSE) and Mean Absolute Percentage Error (MAPE) are used to evaluate the performance of the prediction algorithms. The methodology used in this project is Cross-Industry Standard Process for Data Mining (CRISP-DM), which is a common standard for data mining projects. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    Data mining and analysis for predicting electrical energy consumption by Khudhair I.Y., Dhahi S.H., Alwan O.F., Jaaz Z.A.

    Published 2024
    “…This classification was done using data mining (five algorithms in specific) and data analysis theory. …”
    Article
  11. 11

    Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining by Ang, Yuhao, Mohd Shafri, Helmi Zulhaidi, Al-Habshi, Mohammed Mustafa

    Published 2025
    “…No previous study has investigated Orange mining tool as visual programming approach in analysing hyperspectral reflectance data, especially in crop disease detection. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Denoising histological images for a better colour image segmentation / Sulastri Putit by Putit, Sulastri

    Published 2013
    “…According to (Pierrick Coupe et.al, 2008), image de-noising is used to improve the accuracy of various image processing algorithms such as registration or segmentation. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  20. 20

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
    Get full text
    Get full text
    Conference or Workshop Item