Search Results - (( java implementation mining algorithm ) OR ( remote communication system algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Scalable approach for mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Mining association rules from structured XML data by Abazeed, Ashraf Riad, Mamat, Ali, Sulaiman, Md. Nasir, Ibrahim, Hamidah

    Published 2009
    “…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Securing electrical substation's wireless messaging with a lightweight crypto-algorithm IP core by Abbas Y.A., Jidin R., Jami N., Z'aba M.R.

    Published 2023
    “…We have tested the system with a simplified version of the crypto-algorithm on a VIRTEX evaluation board, using GSM modems communicate over a cellular network. © 2014 IEEE.…”
    Conference Paper
  7. 7

    An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar by Jaafar, Siti Aisyah

    Published 2021
    “…Therefore, in this research, the first objective is to develop an algorithm for a remote AR-IoT monitoring system. The algorithm was designed by utilizing C++ and C# coding language. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Implementation and integration of HF messaging system with cryptographic features by Mat Sidek, Abd. Rahim

    Published 2006
    “…However, the infrastructures of communication still become an issue especially in the remote places. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Development of a New Modeling Circuit for the Remote Terminal Unit (RTU) with GSM Communication by Ab Ghani, Mohd Ruddin, Wan Hassan, Wan Ahmas Redhauddin, Mat Hanafiah, Mohd Ariff, Raman, Siti Hajar

    Published 2013
    “…The design proposed based on Global System for Mobile (GSM) communication and this paper also presents as efficient design for distribution automation system and its implementation in remote/automatic monitoring and controlling of the relays (circuit breaker) by means of GSM Short Message Service (SMS) services, automatic decision making and continuous monitoring of distribution system components in real time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…Smart grid is an evolution from conventional power grid in which power communication system has migrated from one-way to bi-directional communication network. …”
    text::Thesis
  12. 12
  13. 13

    Lightweight PRINCE algorithm IP core for securing GSM messaging using FPGA by Abbas Y.A., Jidin R., Jamil N., Z'aba M.R.

    Published 2023
    “…The system can cipher the data using PRINCE algorithm on a VIRTEX-403 FPGA evaluation board and using GSM modems to communicate over a cellular network. …”
    Article
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of water surface robot system for lake sanitation and sampling / Ahmed Abdullah Omar by Ahmed Abdullah , Omar

    Published 2022
    “…The software design features a mobile app for remote access, live video streaming, mapping system and communication APIs. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Remote monitoring system for electricity meter using ESP32CAM and OCR analysis using MATLAB by Mochammad Shaleh, Mochammad Safii, Chia, Kim Seng

    Published 2024
    “…Key elements of the proposed system encompass an ESP32CAM module equipped with a camera for image capture, integrated wireless connectivity for remote communication, and OCR algorithms for efficient data extraction. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18
  19. 19
  20. 20

    A lightweight and secure online/offline cross-domain authentication scheme for VANET systems in Industrial IoT by Khalid, Haqi, Hashim, Shaiful Jahari, Syed Ahmad, Sharifah Mumtazah, Hashim, Fazirulhisyam, Chaudhary, Muhammad Akmal

    Published 2021
    “…Hence, it is vulnerable to specific attacks (e.g., replay attacks, modification attacks, man-in-the-middle attacks, and insider attacks), making the system inefficient. Also, high processing data increases the computation and communication cost, leading to an increased workload in the system. …”
    Get full text
    Get full text
    Article