Search Results - (( based estimation mining algorithm ) OR ( java implementation some algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Expectation maximization clustering algorithm for user modeling in web usage mining system by Mustapha, Norwati, Jalali, Manijeh, Jalali, Mehrdad

    Published 2009
    “…In this study we advance a model for mining of user’s navigation pattern. The model is based on expectation-maximization (EM) algorithm and it is used for finding maximum likelihood estimates of parameters in probabilistic models, where the model depends on unobserved latent variables. …”
    Get full text
    Get full text
    Article
  5. 5

    Estimating 1-MCP application for Kampuchea guava with data mining technology by Ding, Phebe, Khor, Kor Chin

    Published 2018
    “…In this preliminary study, data mining (DM) technology was utilized to achieve fast estimation of 1-MCP application based on different qualities of 'Kampuchea' Guava. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    An application of IPA approach on the optimization of a mining port stockyard system by Ayu, Media Anugerah, Cardew-Hall, Michael

    Published 2002
    “…The results show that PARMSR algorithm applying IPA can be used to estimate the optimal cost function in subsystem 1 with a high level of confidence. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Using language-based search in mining large software repositories by Awang Abu Bakar, Normi Sham

    Published 2011
    “…For the purpose of automating the data retrieval from the repository, a parser was written using the Python programming language, and based on the pattern matching algorithm. The retrieved data were later used to estimate the quality of the open source software.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Using language-based search in mining large software repositories by Awang Abu Bakar, Normi Sham

    Published 2011
    “…For the purpose of automating the data retrieval from the repository, a parser was written using the Python programming language, and based on the pattern matching algorithm. The retrieved data were later used to estimate the quality of the open source software.…”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18
  19. 19

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…This paper aims to compare the performance of two metaheuristic algorithms which are Jaya Algorithm (JA) and Cuckoo Search (CS) using some common benchmark functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item