Search Results - (( _ application mining algorithm ) OR ( phone application ((use algorithm) OR (tree algorithm)) ))

Refine Results
  1. 1
  2. 2
  3. 3

    Wearable based-sensor fall detection system using machine learning algorithm by Ishak, Anis Nadia, Habaebi, Mohamed Hadi, Yusoff, Siti Hajar, Islam, Md. Rafiqul

    Published 2021
    “…Then, a Machine Learning Algorithm (MLA) is used to train and test the data before a classifier is used to classify the new incoming dataset. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Mobile Learning: An Application Prototype for AVL Tree Learning Object by Ibrahim, Mohammad Noor, Mahamad, Saipunidzam, Chua, Edrea Ning Wei

    Published 2010
    “…The rapid growth of mobile phone technologies encourages many researchers to explore, design and develop mobile learning applications for tertiary students. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Mobile Learning: An Application Prototype for AVL Tree Learning Object by Ibrahim, Mohammad Noor, Mahamad, Saipunidzam, Chua, Edrea Ning Wei

    Published 2010
    “…The rapid growth of mobile phone technologies encourages many researchers to explore, design and develop mobile learning applications for tertiary students. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Content-based indexing of low resolution documents by Md Nor, Danial

    Published 2016
    “…Tree indexing for extracted layout and shape features are structured hierarchically and Euclidean distance is used to get similarity image for CBIR. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Modifying iEclat algorithm for infrequent patterns mining by Julaily Aida, J., Mustafa, M.

    Published 2018
    “…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Efficient prime-based method for interactive mining of frequent patterns. by Mohammad Hossein, Nadimi Shahraki, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2011
    “…Since rerunning mining algorithms from scratch is very costly and time-consuming, researchers have introduced interactive mining of frequent patterns. …”
    Get full text
    Get full text
    Article
  11. 11

    Machine Learning Applications in Multiplayer Online Battle Arena Esports—A Systematic Review by Ahmad Alif, Kamal, Mohd. Asyraf, Mansor, Liyana, Truna, Norhunaini, Mohd. Shaipullah, Nor Hafizie, Habib Sultan

    Published 2025
    “…There are 35 studies included in this systematic review, with most studies on Defence of the Ancients 2 (DotA 2) and League of Legends (LoL). ML algorithms are used to make predictions for different purposes using game mechanics and player profiles as datasets, with random forests, decision trees, logistic regression, neural networks, and more. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Clustering algorithm for market-basket analysis : the underlying concept of data mining technology by Abdul Kadir, Khairil Annuar

    Published 2003
    “…The author used a data mining software called PolyAnalyst 4.5 to perform analysis on the set of items that customers have bought in supermarket for market-basket application. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Modifying iEclat algo ithm for infrequent patterns mining by Julaily Aida, Jusoh, Mustafa, Man

    Published 2018
    “…This paper proposes an enhancement algorithm based on iEclat algorithms for mining infrequent pattern.…”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16

    The child tracker using location awareness / Muhammad Idham Amdan by Amdan, Muhammad Idham

    Published 2017
    “…In this paper, the aim of proposed conceptual smartphone tracker framework is to provide mobile phone security and to locate ability of device in form of mobile application.…”
    Get full text
    Get full text
    Thesis
  17. 17

    Development of mobile robot controlled by android phone via Bluetooth by Wan Idris Najaran, Wan Nur 'Amirah

    Published 2015
    “…The robot is controlled wirelessly using the Bluetooth feature which is present in all android smart phones. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Development of mobile robot controlled by android phone via Bluetooth: article by Wan Idris Najaran, Wan Nur 'Amirah

    Published 2015
    “…The robot is controlled wirelessly using the Bluetooth feature which is present in all android smart phones. …”
    Get full text
    Get full text
    Article
  19. 19

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…The enormous of information on the World Wide Web makes it obvious candidate for data mining research. Application of data mining techniques to the World Wide Web referred as Web mining where this term has been used in three distint ways; Web Content Mining, Web Structure Mining and Web Usage Mining. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20