Search Results - (( users integration based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- users integration »
- integration based »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
User-centric based vertical handover decision algorithm for telecardiology application in heterogeneous networks
Published 2015“…The algorithm was compared with traditional quality of service based and cost based vertical handover algorithms. …”
Get full text
Get full text
Article -
8
An integration of AHP-ACO technique for social interaction and travel planning
Published 2016“…This study presents the integration methods of AHP algorithm for point of interest decision-making and ACO and rule-based algorithms for route optimization. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Relationship based replication algorithm for data grid
Published 2014“…Such an approach overcomes existing algorithms that is based either on users request or resource capabilities as an individual. …”
Get full text
Get full text
Monograph -
10
Naive bayes algorithm based e-mail spamming filtering system
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
11
Design and development of the network interface, packets scheduling and interference mitigation schemes for LTE-based femtocell networks / Sinan Ghassan Abid Ali
Published 2016“…The proposed RBP scheduling algorithm outperforms the well-known scheduling algorithms in terms of a lower PLR among users in the LTE based femtocell network. …”
Get full text
Get full text
Thesis -
12
Website assurance monitoring application with MD5 Hashing and SHA-26 Algorithm / Abdullah Sani Abd Rahman and Samsiah Ahmad
Published 2022“…The Website Assurance Monitoring application has been developed based on MD5 hashing technique and SHA26 algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…The first algorithm is based on integrating the maximum product of effective channel gains and the maximum SIR with the PF principle (PF-MPECG-SIR) to select strong users in the first stage and weak users in the second stage. …”
Get full text
Get full text
Thesis -
14
Fusion of license plate and face recognition for secure parking / Siti Salwa Md Noor
Published 2013“…Then, cryptosystem algorithm based on Hill Cipher and random number is implemented as encryption and decryption techniques as protection for registered users as stored in the database. …”
Get full text
Get full text
Thesis -
15
-
16
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…The main objective of this paper is to propose and implement an intelligent framework documentation approach that integrates case-based learning (CBL) with genetic algorithm (GA) and Knuth-Morris-Pratt (KMP) pattern matching algorithm with the intention of making learning a framework more effective. …”
Conference paper -
17
Railway shortest path planner application using ant colony optimization algorithm / Muhammad Hassan Firdaus Ruslan
Published 2017“…In this paper, users requirement are determined based on the time taken to reach the destination station. …”
Get full text
Get full text
Thesis -
18
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
19
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…TF-IDF Algorithm technique is performed to develop system by calculating the most relevant pages in the textbook based on keyword that entered by user’s query. …”
Get full text
Get full text
Thesis -
20
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…The need to meet the quality of service (QoS) requirements for this rapidly expanding user base, particularly with heightened data rate expectations, underscores the urgency for innovative solutions. …”
Get full text
Get full text
Get full text
Thesis
