Search Results - (( program visualization mining algorithm ) OR ( wave applications interface algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure by Asmai, S. A.

    Published 2014
    “…The other 40% of the dataset is used to test generated rules. A simple program of C++ is implemented using Microsoft Visual Studio to test generated rules until accuracy of performance is obtained. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Brain computer interface design and applications: challenges and future by Alwasiti, Haider Hussein, Aris, Ishak, Jantan, Adznan

    Published 2010
    “…Successful Brain Computer Interface (BCI) systems have many potential applications, especially for patients who are paralyzed. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining by Ang, Yuhao, Mohd Shafri, Helmi Zulhaidi, Al-Habshi, Mohammed Mustafa

    Published 2025
    “…No previous study has investigated Orange mining tool as visual programming approach in analysing hyperspectral reflectance data, especially in crop disease detection. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno by Karno, Md Razib

    Published 2015
    “…Bibliomining are tools that can visualize how libraries manage their costs, staff activity, customer service, user needs, marketing, popular books, circulation, reference transaction, quality of collection, educational programs etc. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Evaluation of Current Music Synthesis Software for Rendering of Various Synthesis Algorithms by Tan, Julie Lee Mei

    Published 2000
    “…The ability to distinguish the usefulness of currently available music synthesis software for the application of various synthesis algorithms is the main focus of the research. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Classification of Distracted Male Driver Based on Driving Performance Indicator (DPI) by Ganasan, Shatiskumar, Norazlianie, Sazali

    Published 2024
    “…Weka software was used for “data mining” to get insights from a vast dataset. Weka is a strong data mining and machine learning program including algorithms for data preparation, classification, regression, clustering, and visualization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14

    Parallel implementation of complexity reduction approach to fourth order approximation on 2D free space wave propagation. by Hasan, Mohammad Khatim, Othman, Mohamed, Abbas, Zulkifly, Sulaiman, Jumat, Ahmad, Fatimah

    Published 2008
    “…In this paper we solve 2D wave propagation problems on a Symmetrical Multiprocessor machine using message-passing interface. …”
    Get full text
    Get full text
    Article
  15. 15

    Automatic mapping of concrete strength in structural element by Hamid, Roszilah, Mohamed, Ramizi, Mohd. Nayan, Khairul Anuar, Osman, Siti Aminah, Mohd. Yusof, Kamarudin

    Published 2006
    “…The impact generates stress wave, which propagate through the concrete. The accelerometer receives the wave and changes the display from time to frequency domain. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16
  17. 17
  18. 18

    Secured mobile transaction using NFC Technology: Top-Up printing system by Ayu, Media Anugerah, Mantoro, Teddy, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2011
    “…As for the security measurement, MD5 algorithm is implemented to accept the system authorization. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    NFC secured online transaction in mobile computing business by Mantoro, Teddy, Ayu, Media Anugerah, Brotosaputro, Gunawan, Ain, Nur F., Ghazali, Noorzalina

    Published 2012
    “…As for the security measurement, MD5 algorithm is implemented to process the system authorization. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20