Search Results - (( user evaluation process algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS. by FAROOQ, HUMERA

    Published 2012
    “…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Independent task scheduling algorithms in fog environments from users’ and service providers’ perspectives: a systematic review by Al-Qadhi, Abdulrahman K., Latip, Rohaya, Chiong, Raymond, Athauda, Rukshan, Hussin, Masnida

    Published 2025
    “…To assure unbiased evaluation, a benchmark to assess task scheduling algorithms is proposed based on comparison to state-or-art algorithms, applicability to real-world contexts, meeting the objectives of the study, negative impacts on other performance metrics, and sizes of datasets used for evaluation. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Backhaul load and performance optimality of partial joint processing schemes in LTE-A networks by Kousha, Mohammad

    Published 2014
    “…A dynamic user-wise algorithm is proposed to resolve this problem. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhancement of Space-Time Receiver Structure with Multiuser Detection for Wideband CDMA Communication Systems by Subramaniam, Jeevan Rao

    Published 2006
    “…The algorithms are used to adjust the weights of the antenna array to form the appropriate beam patterns to track the desired user and null interfering users. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio... by Daba, Layth Muwafaq Abdulhussein

    Published 2023
    “…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Implementation of generalized predictive control (GPC) for a real-time process control using labview by Mohd. Faudzi, Ahmad 'Athif

    Published 2006
    “…As for this, real time control will be applied to the coupled tank as the test bed for level control process. Experimental evaluation and comparison of the predictive algorithm performance will be benchmarked against PID control. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Segmentation of MRI brain images using statistical approaches by Balafar, Mohammad Ali

    Published 2011
    “…Moreover, three improvements of EM for brain MRI segmentation are proposed, which incorporate neighbourhood information in a new manner in the clustering process. In addition, two algorithms for the post-processing of clustering results using user-interaction and the re-evaluation of boundary data in each cluster are presented. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Performance analysis of resource allocation downlink for MIMO-OFDMA system using Greedy algorithm. / Azrinawati Samaon by Samaon, Azrinawati

    Published 2014
    “…The proposed algorithm shows comparison between the noise to sub-channel ratio and power allocation in the midst of data sub-channel for 25, 75 and 100 users. …”
    Get full text
    Get full text
    Article
  20. 20

    User authentication in public cloud computing through adoption of electronic personal synthesis behavior by Mohanaad Talal Shakir

    Published 2023
    “…Moreover, the learning process of the proposed algorithm for behavior recognition designed as a matching factor with a password during the authentication process. …”
    text::Thesis