Search Results - (( developing formative practices algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- developing formative »
- formative practices »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…This research constructs a self-generated calculation algorithm as a decision engine in a practical, user-friendly Decision Support System to determine the best team formation and the suitable playing position for players in a football team. …”
Get full text
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
The use of the Bayesian approach in the formation of the student's competence in the ICT direction
Published 2019“…The paper gives a small introduction about the competence of students and explores the possibility of using Bayesian networks in the formation of the competence of an IT trainer. Developed an integrated algorithm for the formation of the competence of training in the direction of IT.…”
Get full text
Get full text
Conference or Workshop Item -
10
Agreement options for negotiation on material location decision of housing development
Published 2020“…Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
Get full text
Get full text
Article -
11
Graph-Based Algorithm With Self-Weighted And Adaptive Neighbours Learning For Multi-View Clustering
Published 2024“…To address the noise problem in multi-view data, this study enhances the gbs method and develops a new self-weighted graph multi-view clustering algorithm (swmcan). …”
Get full text
Get full text
Thesis -
12
Hybrid BLEU Algorithm For Structured Exam Management System
Published 2008“…Due to this problem, "Hybrid BLEU algorithm for Structured Exam Management System " is develop to aid the lecturers during assessment in the construction of quiz and test. …”
Get full text
Get full text
Get full text
Thesis -
13
Design, development and evaluation of a game-based learning application for room housekeeping
Published 2024“…The transition of practical skills training into a digital format presents distinct challenges and opportunities within the hospitality industry. …”
Get full text
Get full text
Get full text
Article -
14
Improving performance of automated coronary arterial tree center-line extraction, stent localization and tracking
Published 2012“…Over the last decade, many algorithms have been developed to address this problem. …”
Get full text
Get full text
Thesis -
15
Mobile Travel Guide For Tourism
Published 2007“…This system is using SMS as the user interface and it understands users' input with predetermined format as queries to access the database. Methodology that is practically adequate to be implemented in this system is Phased Development-based methodology. …”
Get full text
Get full text
Final Year Project -
16
Modular deep neural network in reducing overfitting to enhance generalization / Mohd Razif Shamsuddin
Published 2024“…In the first phase, the NN is tested with two different data formatting to ensure which data format is more suitable for the next consecutive experiments. …”
Get full text
Get full text
Thesis -
17
Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game
Published 2015“…Henceforth, EP is introduced as a benchmarking algorithm and this created our last sub-objective. …”
Get full text
Get full text
Get full text
Thesis -
18
A new multi-frames watermarking technique for tamper detection and recovery
Published 2017“…Nowadays, medical image modalities have been digitalized and standardized into DICOM format which exhibit multi-frames characteristics; hence, multi-frames medical images have been widely used in clinical practice but it has been found that most of watermarking researches were conducted on single-frame medical image because their focus was on the intrinsic algorithm of watermarking scheme. …”
Get full text
Get full text
Thesis -
19
Teaching students interdisciplinary knowledge through compilation of differential models within the framework of course projects / Duisebek Nurgabyl ... [et al.]
Published 2023“…Thus, the need to study and solve these problems, their theoretical and practical significance in the formation of interdisciplinary knowledge among future mathematics teachers determines the relevance of the research topic. …”
Get full text
Get full text
Get full text
Article -
20
Preserving the confidentiality of final examination question paper using image steganography technique / Aviefieorennia Tompell
Published 2016“…This project focus on the Least Significant Bit algorithm in Image Steganography while providing a practical understanding of what Steganography is and how to accomplish it. …”
Get full text
Get full text
Student Project
