Search Results - (( using combination using algorithm ) OR ( java implementation mining algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…In cluster generating process, the developed BBSI algorithm was used to select the best band combination for generating cluster by using Iterative self- Organizing Data Analysis (ISODATA) technique. …”
    Get full text
    Get full text
    Thesis
  9. 9

    To study the performance of stemming algorithm on Malay words beginning with the letter "S" / Rohana Jantan by Jantan, Rohana

    Published 2000
    “…This algorithm is used in the Malay language document that is used is the Quran translated document. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An Experimental Study Of Combinational Logic Circuit Minimization Using Firefly Algorithm by Aznilnda, Zainodin, Aida Khairunisa, Ab. Kadir, M. Nasir, Ayob, Ahmad Fariz, Hasan, Amar Faiz, Zainal Abidin, Fazlinashatul Suhaidah, Zahid, Hazriq Izuan, Jafar, Ismail, Mohd Khairuddin

    Published 2014
    “…Combinatorial logic circuit minimization is usualy done using Karnaugh’s Map or Bolean equation. This paper presents an aplication of Firefly Algorithm to design combinational logic circuit in which the objective function is to minimize the total number of gates used. …”
    Get full text
    Get full text
    Article
  11. 11

    Study of stemming algorithm for Malay words which begin with alphabets 'M' / Mohd Zawawi Mohd Yunus by Mohd Yunus, Mohd Zawawi

    Published 2000
    “…These stemming algorithm problems will be solved by doing five experiments such as analysis the existing algorithm, do correction in the file, adding rules, correct the stemming algorithm and use two combination rules. …”
    Get full text
    Get full text
    Thesis
  12. 12

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    To improve stemming algorithm on Malay words begin with alphabet B / Norasiah Ismail by Ismail, Norasiah

    Published 2001
    “…This involves the use of two combinations simultaneously such as the pair combination of prefix-suffix-prefix suffix-infix as primary combinations and prefix suffix-suffix-prefix-infix as the secondary. …”
    Get full text
    Get full text
    Thesis
  14. 14

    The study of stemming algorithm for Malay words that start with the letter 'B' from translated Quran documents / Azriana Ahmad by Ahmad, Azriana

    Published 1999
    “…The performance of this Malay stemming algorithm is tested using translated Quran documents and Malay dictionary. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Ensemble dual recursive learning algorithms for identifying flow with leakage by Akib, Afifi, Saad , Nordin, Asirvadam , Vijanth Sagayan

    Published 2010
    “…For this purpose, three models is developed, first using recursive least square algorithm (RLS), second using recursive instrument variable (RIV) algorithm and lastly using combination of this two algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Shape-based recognition using combined Jaccard and Mahalanobis measurement / Noor Aznimah Abdul Aziz by Abdul Aziz, Noor Aznimah

    Published 2013
    “…Therefore, we proposed a shape recognition algorithm using similarity measurement combining Jaccard and Mahalanobis distance is used to measure the similarity between geometry shape sketches. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Committee neural networks with fuzzy genetic algorithm. by Jafari , S.A., Mashohor , Syamsiah, Varnamkhasti, M. Jalali

    Published 2011
    “…There are different ways of combining the intelligent systems' outputs in the combiner in the committee neural network, such as simple averaging, gating network, stacking, support vector machine, and genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    To enhance existing Malay stemming algorithm starting with the letter 'D' / Mohd Nazril Hafez Mohd Supandi by Mohd Supandi, Mohd Nazril Hafez

    Published 2000
    “…In which it involves the use of two combinations simultaneously such as the pair combination of 1234 as primary combination and 2341 as the secondary. …”
    Get full text
    Get full text
    Thesis