Search Results - (( based testing mining algorithm ) OR ( java application based algorithm ))
Search alternatives:
- application based »
- mining algorithm »
- java application »
- testing mining »
- based testing »
-
1
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
2
Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob
Published 2014“…This problem can cause the imbalance in sales. Based on the problem statement, Genetic Algorithm was applied to test whether it is compatible to predict the future sales. …”
Get full text
Get full text
Thesis -
3
Genetic Algorithm for Web Data Mining
Published 2001“…By doing so, it could assist the process of data mining for information in the World Wide Web. This study used a prototype program based on genetic algorithm to manipulate the initial set of data. …”
Get full text
Get full text
Project Paper Report -
4
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
5
A Rough-Apriori Technique in Mining Linguistic Association Rules
Published 2008“…It uses the rough membership function to capture the linguistic interval before implementing the Apriori algorithm to mine interesting association rules. The performance of conventional quantitative association rules mining algorithm with Boolean reasoning as the discretization method was compared to the proposed technique and the fuzzy-based technique. …”
Get full text
Get full text
Get full text
Book Chapter -
6
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
Discovering association rules for mining images datasets: a proposal
Published 2005“…A synthetic image set containing geometric shapes will generate to test the initial algorithm implementation. The experiments results show that there is promise in image mining based on content. …”
Get full text
Get full text
Conference or Workshop Item -
9
Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining
Published 2019“…Findings showed that the numerical predictions on FT and ST (RRSE ~ 25%) were about two folds better than the WT and SWT (RRSE ~50%) in the six algorithms tested. The best prediction performance was gained on FT indicator using the M5P algorithm (RRSE = 22.44%). …”
Get full text
Get full text
Thesis -
10
A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm.
Published 2009“…The approach is based on the using longest common subsequence algorithm to classify current user activities to predict user next movement. …”
Get full text
Get full text
Article -
11
Multi-objective Binary Clonal Selection Algorithm In The Retrieval Phase Of Discrete Hopfield Neural Network With Weighted Systematic Satisfiability
Published 2024“…Based on the findings, the proposed logic mining model outperformed other baseline logic mining models for all the performance metrics used in the repository dataset. …”
Get full text
Get full text
Thesis -
12
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
13
Case Slicing Technique for Feature Selection
Published 2004“…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
14
WebPUM : a web-based recommendation system to predict user future movements.
Published 2010“…The approach is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining phase. …”
Get full text
Get full text
Get full text
Article -
15
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
16
Enhanced ontology-based text classification algorithm for structurally organized documents
Published 2015“…The third algorithm is the Ontology Based Text Classification (OBTC) and is designed to reduce the dimensionality of training sets. …”
Get full text
Get full text
Get full text
Thesis -
17
Computational Discovery of Motifs Using Hierarchical Clustering Techniques
Published 2008“…This paper aims to develop data mining techniques for discovering motifs. A mismatch based hierarchical clustering algorithm is proposed in this paper, where three heuristic rules for classifying clusters and a post-processing for ranking and refining the clusters are employed in the algorithm. …”
Get full text
Get full text
Get full text
Proceeding -
18
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
19
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
Get full text
Get full text
Thesis
