Search Results - (( program sample mining algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 8 results of 8
Refine Results
  1. 1

    Predicting students’ STEM academic performance in Malaysian secondary schools using educational data mining by Termedi @ Termiji, Mohammad Izzuan

    Published 2023
    “…Four different data mining classification algorithms which are Random Forest, PART, J48 and Naive Bayes will be used on the dataset. …”
    Get full text
    Get full text
    Thesis
  2. 2

    The discovery of Top-K DNA frequent patterns with approximate method / Nittaya Kerdprasop and Kittisak Kerdprasop by Kerdprasop, Nittaya, Kerdprasop, Kittisak

    Published 2014
    “…These representatives are subsequently used in the main process of frequent pattern mining. Our designed algorithm had been implemented with the Erlang language, which is the functional programming paradigm with inherent support for pattern matching. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Face recognition using eigenfaces and smooth support vector machine by Mhd, Furqan

    Published 2011
    “…Support Vector Machine (SVM) is a new algorithm of data mining technique, recently received increasing popularity in machine learning community. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Face recognition using eigenfaces and smooth support vector machine by Mhd, Furqan

    Published 2011
    “…Support Vector Machine (SVM) is a new algorithm of data mining technique, recently received increasing popularity in machine learning community. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  5. 5

    Classification of Distracted Male Driver Based on Driving Performance Indicator (DPI) by Ganasan, Shatiskumar, Norazlianie, Sazali

    Published 2024
    “…Weka software was used for “data mining” to get insights from a vast dataset. Weka is a strong data mining and machine learning program including algorithms for data preparation, classification, regression, clustering, and visualization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8