Search Results - (( construct solution mining algorithm ) OR ( java _ normalization algorithm ))
Search alternatives:
- normalization algorithm »
- construct solution »
- mining algorithm »
- solution mining »
-
1
Using unique-prime-factorization theorem to mine frequent patterns without generating tree
Published 2011“…For huge database it may need to generate a huge number of candidate sets. An interest solution is to design an approach that without generating candidate is able to mine frequent patterns. …”
Get full text
Get full text
Get full text
Article -
2
Hybrid tabu search – strawberry algorithm for multidimensional knapsack problem
Published 2022“…The Greedy heuristics by ratio was employed to construct an initial solution. Next, the solution was enhanced by using the hybrid TS-SBA. …”
Get full text
Get full text
Get full text
Thesis -
3
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…The designed modules is in the form of algorithms, GridSim, Java Development Kits and Java Language used to support the design process whereas the Netbeans software serves as the platform to simulate the experiment so as to obtain the results. …”
Get full text
Get full text
Get full text
Thesis -
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
5
-
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
7
A Hybrid Evaluation Metric for Optimizing Classifier
Published 2011Get full text
Get full text
Get full text
Proceeding -
8
A hybrid evaluation metric for optimizing classifier
Published 2011Get full text
Get full text
Conference or Workshop Item -
9
Ideal combination feature selection model for classification problem based on bio-inspired approach
Published 2020“…Such a finding indicates that the exploitation of bio-inspired algorithms with ideal combination of wrapper/filtered method can contribute in finding the optimal features to be used in data mining model construction.…”
Get full text
Get full text
Book Section -
10
Information extraction using Link Grammar
Published 2009“…LG appears within limited literature search to be the most suitable candidate algorithm. However, an exhaustive literature search will reveal the algorithm best suited to this application work. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
13
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Identifying Features Eligiblity For Blood Donors' Preferences Using Artificial Neural Networks Prediction Performances
Published 2017“…These findings of this study contribute as beneficial information to improve blood donation or healthcare service, as guide to collect and arrange data into prediction or another data mining problems, and extend another study for flexible algorithms with various datasets.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
16
An integrated anomaly intrusion detection scheme using statistical, hybridized classifiers and signature approach
Published 2015“…Detection methods based on statistical and data mining techniques are widely deployed as anomaly-based detection system (ADS). …”
Get full text
Get full text
Thesis -
17
Multi-modality ontology semantic image retrieval with user interaction model / Mohd Suffian Sulaiman
Published 2020“…Four main components comprising resource identification, information extraction, knowledge-based construction and image retrieval mechanism are the main tasks need to be implemented in this model. …”
Get full text
Get full text
Thesis -
18
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis
