Search Results - (( usage integration system algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- integration system »
- application mining »
- usage integration »
- system algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Development of a Raspberry Pi Drowsiness Detection System based on Histogram of Oriented Gradient (HOG) Algorithm and Eye Aspect Ratio (EAR) Formula
Published 2020“…This is due to the systems’ high-power usage nature, usage of expensive technologies and difficulties in integrating the detection system into all vehicles’ system. …”
Get full text
Get full text
Final Year Project -
8
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2023Conference paper -
9
Dynamic characterized genetic algorithm for adaptive beam forming in WCDMA system
Published 2005Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
Replica Creation Algorithm for Data Grids
Published 2012“…The new Data Replica Creation Algorithm (DRCM) improves performance of data grid systems by reducing job execution time and making the best use of data grid resources (network bandwidth and storage space). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
WCDMA teletraffic performance improvement via power resource optimization using distributed parallel genetic algorithm
Published 2023“…The algorithm works by finding the minimum transmitter power with the help of Distributed Parallel Genetic Algorithm (DPGA) employed on an offload microcontroller system to form optimal beam coverage to reduce power usage of adaptive antenna at WCDMA base station. …”
Conference paper -
13
Workload utilization dissemination on grid resources for simulation environment
Published 2013“…In contemplating the exploration, this study successfully describe the pattern of workload dissemination through the usage of the RI's and elicited the enhancement factors for systems performance. …”
Get full text
Get full text
Conference or Workshop Item -
14
Smart IoT energy optimisation and localisation monitoring for e-bike sharing
Published 2025“…The methodology involved integrating sensors to collect key data, implementing connectivity for real-time monitoring, and developing an energy optimization algorithm to prolong battery life, improving the efficiency of the e-bike sharing system. …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Relationship based replication algorithm for data grid
Published 2014“…The Relationship based Replication algorithm aims to improve the Data Grid performance by reducing the job execution time, bandwidth and storage usage.The RBR was realized using a network simulation (OptorSim) and experiment results revealed that it offers better performance than existing replication algorithms.…”
Get full text
Get full text
Monograph -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
17
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
ATM crime detection using image processing integrated video surveillance : a systematic review
Published 2019“…Integrating image processing in video surveillance systems is a challenging task that has been attempted for the past several decades. …”
Get full text
Get full text
Get full text
Article -
19
Enhanced Storage Mechanism for Secured Parallel Network File System
Published 2018“…The main aim of this dissertation is to study how parallel network file system and storage appliances are integrated to storage computing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…As the future works, the system can be improved by applied the system using mobile apps application to make the system can have easier access and implementation of another technique such as semantic-based searching and the usage of stemming algorithm would be considered to produce more meaningful results.…”
Get full text
Get full text
Thesis
