Search Results - (( developing formative mining algorithm ) OR ( java operation research algorithm ))
Search alternatives:
- developing formative »
- research algorithm »
- mining algorithm »
- java operation »
-
1
Framework for mining XML format business process log data
Published 2024“…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
Get full text
Get full text
Thesis -
2
Improving Class Timetabling using Genetic Algorithm
Published 2006“…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis -
3
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
4
Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno
Published 2015“…The data mining technique was adopted to explore the relationship among statistically patterned and clustered bibliographic data. …”
Get full text
Get full text
Thesis -
5
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…The genetic algorithm approach that been used in this research has been proven by other research study before that it will easily handle this types of problem where the optimal solution will be generated. …”
Get full text
Get full text
Thesis -
6
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
7
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
8
Evaluation of Formation Damage from Transient Pressure Analysis: Unsteady State Skin Factor
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Besides that, the system will build in Windows 2000 Professional Operating System. The project approaches the research and development process as a two dimensional recognition problem, capturing the face image by using the web camera. …”
Get full text
Get full text
Thesis -
10
Text messaging encryption system
Published 2012“…The programming language that is used to write the program is Java Language.…”
Get full text
Get full text
Undergraduates Project Papers -
11
Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.]
Published 2023“…An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
Get full text
Get full text
Article -
12
Multi-agent and artificial neural networks prediction framework development for stock investment strategy
Published 2016“…WMA comprises of an algorithm for web mining which enables it to mine and extract semi-structured information and create new structured information using ontology. …”
Get full text
Get full text
Thesis -
13
Multi agent and artificial neural networks prediction framework development for stock investment strategy
Published 2016“…WMA comprises of an algorithm for web mining which enables it to mine and extract semi-structured information and create new structured information using ontology. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman
Published 2023“…This research discusses the concept of biological systems in Deoxyribonucleic Acid (DNA) which involves formal language theory namely splicing system. …”
Get full text
Get full text
Thesis -
17
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…This RiCCA prototype is developed from Danger Theory algorithms that is Dendritic Cell Algorithm (DCA) and Deterministic Dendritic Cell Algorithm (dDCA). …”
thesis::doctoral thesis -
18
A Threshold-Based Combination of String and Semantic Similarity Measures for Record Linkage
Published 2011“…In other words, in different databases, one entity may be available in different formats. Therefore, when these databases are combined, the availability of entities in different formats causes duplication. …”
Get full text
Thesis -
19
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…This research presents a design and development of robotic system based on LEGO Mindstorm kit. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…Presently, many researches have been made on remote monitoring and its techniques. …”
Get full text
Get full text
Thesis
