Search Results - (( visual realization based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- visual realization »
- application mining »
- realization based »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…As the conclusions, this leading grid-based application platform has a bright potential in managing highly scalable and reliable temperature prediction visualization. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Application of target detection method based on convolutional neural network in sustainable outdoor education
Published 2023“…In order to realize the intelligence of underwater robots, this exploration proposes a submersible vision system based on neurorobotics to obtain the target information in underwater camera data. …”
Get full text
Get full text
Article -
9
Enhancement of medical image compression algorithm in noisy WLANS transmission
Published 2018“…For image reconstruction,decoding steps based the developed quantization architecture are examined.The EICA is particularly useful where the size of the transmitted data needs to be reduced to minimize the image transmission time.For data compression with suitable and effective performance,enhanced independent components analysis (EICA) is proposed as an algorithm for compression and decompression of medical data.A comparative analysis is performed based on existing data compression techniques:discrete cosine transform (DCT), set partitioning in hierarchical trees (SPIHT),and Joint Photographic Experts Group (JPEG 2000).Three main modules,namely,compression segment (CS),transceiver segment (TRS),and outcome segment (OTS) modules,are developed to realize a fully computerized simulation tool for medical data compression with suitable and effective performance.To compress medical data using algorithms,CS module involves four different approaches which are DCT, SPIHT,JPEG 2000 and EICA.TRS module is processed by low-cost WLANs with low-bandwidth transmission.Finally,OTS is used for data decompression and visualization result.In terms of compression module,results show the benefits of applying EICA in medical data compression and transmission.While for system design,the developed system displays favorable outcomes in compressing and transmitting medical data.In conclusion,all three modules (CS,TRS,and OTS) are integrated to yield a computerized prototype named as Medical Data Simulation System(Medata-SIM) computerized system that includes medical data compression and transceiver for visualization to aid medical practitioners in carrying out rapid diagnoses.…”
Get full text
Get full text
Get full text
Thesis -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
The mathematics of 3D buffering for simple geospatial primitives
Published 2003“…This paper describes an effort towards realizing 3D buffering operations for 3D GIS. The buffering is based on spatial data primitives of points, lines, and polygons. …”
Get full text
Get full text
Article -
12
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
13
Augmented reality monitoring system for cross-belt conveyor in advanced automation line / Sukarnur Che Abdullah ... [et al.]
Published 2025“…This motivates our initiative to develop a simulation of a cross-belt conveyor system. The algorithms for the conveyor system were implemented using C# within Visual Studio and Unity environments. …”
Get full text
Get full text
Get full text
Article -
14
Decision tree as knowledge management tool in image classification
Published 2008“…Expert System has been grown so fast as a science that study how to make computer capable of solving problems that typically can only be solved by expert.It has been realized that the biggest challenge of developing expert system is the process include expert’s knowledge into the system.This research tries to model expert’s knowledge management using case based reasoning method.The knowledge itself is not inputted directly by the expert, but rather the system will learn the knowledge from what the expert did to the previous cases.This research takes image classification as the problem to be solved.As the knowledge development technique, we build decision tree by using C4.5 algorithm.Variables used for building the decision tree are the image visual features.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
UiTM Transportation Unit bus trip scheduling system / Noorzawanah Ab Rahim
Published 2009“…The proposed heuristic algorithm is based on the simple greedy search, that guide the search efficiently and able to find good solutions. …”
Get full text
Get full text
Thesis -
16
Implementation of MRAC, SVMPC and PID control based on direct digital control application for dc servomotor
Published 2005“…The desired behavior of the adaptive controller is expressed by utilizing reference model, and the algorithms have been realized using the Lyapunov method and MIT rules. …”
Get full text
Get full text
Thesis -
17
Clustering-based cloud migration strategies
Published 2018“…This model comprises a web of migration strategies, which provides an unambiguous visualization of the selected migration strategy. The cloud migration strategy targets the technical aspects linked with cloud facilities and measures the critical realization factors for cloud acceptance. …”
Get full text
Get full text
Article -
18
Clustering-based cloud migration strategies
Published 2018“…This model comprises a web of migration strategies, which provides an unambiguous visualization of the selected migration strategy. The cloud migration strategy targets the technical aspects linked with cloud facilities and measures the critical realization factors for cloud acceptance. …”
Get full text
Get full text
Article -
19
Optimization of chemotherapy using metaheuristic optimization algorithms / Prakas Gopal Samy
Published 2024“…The HM emerges as a dominant strategy, driven by the Multi-Objective Differential Evolution (MODE) algorithm under literature-based control parameter settings for the mathematical model. …”
Get full text
Get full text
Get full text
Thesis -
20
Measuring Enterprise Architecture / Siti Fatimah Azzahra Ibrahim
Published 2016Get full text
Get full text
Thesis
