Search Results - (( data applications usage algorithm ) OR ( java application sensor algorithm ))

Refine Results
  1. 1

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…The process begins through the monitoring of plants using sensors connected to the Arduino device. Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…Web usage mining consists of three main phases, namely Data Preprocessing. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…E-Leaming is one of the Web based application where it will facing with large amount of data. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    A web usage mining approach based on LCS algorithm in online predicting recommendation systems by Jalali, Mehrdad, Mustapha, Norwati, Sulaiman, Md. Nasir, Mamat, Ali

    Published 2008
    “…Web Usage Mining (WUM) systems are specifically designed to carry out this task by analyzing the data representing usage data about a particular Web site. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases by Hazzaimeh, Yousef Abd-AlMohdi

    Published 2008
    “…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Development of decentralized data fusion algorithm with optimized kalman filter. by Quadri, Sayed Abulhasan

    Published 2016
    “…The results in all the applications confirm that optimization has significantly reduced execution time and memory usage of selected data fusion algorithm. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…Secondly, a modified πRKM algorithm is proposed to partition the user session data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Data pre-processing on web server logs for generalized association rules mining algorithm by Abd Wahab, Mohd Helmy, Mohd, Mohd Norzali, Hanafi, Hafizul Fahri, Mohamad Mohsin, Mohamad Farhan

    Published 2008
    “…Since the pre-processing is tedious process, it depending on the algorithm and purposes of the applications.…”
    Get full text
    Get full text
    Article
  15. 15

    Fatigue data editing algorithm for automotive applications by Shahrum Abdullah, John R. Yates, Joseph A. Giacornin

    Published 2005
    “…The accuracy of the algorithm has been evaluated by application to two experimentally measured data sets containing tensile and compressive preloading conditions. …”
    Get full text
    Get full text
    Article
  16. 16

    Web usage mining: A review of recent works by Omar, Rosli, Md Tap, Abu Osman, Abdullah, Zainatul Shima

    Published 2015
    “…Web mining is the application of data mining on web data and web usage mining is an important component of web mining. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  17. 17
  18. 18

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. …”
    Get full text
    Get full text
    Thesis
  19. 19

    E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam by Norhisam, Nor Faezahtul Salme

    Published 2020
    “…Next, the TF-IDF algorithm is performed on the processed data to find the relevant hadith based on the user’s query. …”
    Get full text
    Get full text
    Thesis
  20. 20