Search Results - (( developing mining efficient algorithm ) OR ( java detection using algorithm ))
Search alternatives:
- developing mining »
- mining efficient »
- using algorithm »
- java detection »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Energy efficiency of the bitcoin mining hardware and related blockchain technology
Published 2018“…MATLAB is used in developing and validation the algorithm. Dataset was selected from open sources and applied in the proposed formula to evaluate and predict energy efficiency of bitcoin mining hardware. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
4
Algorithms for frequent itemset mining: a literature review
Published 2018“…This paper reviews and presents a comparison of different algorithms for Frequent Pattern Mining (FPM) so that a more efficient FPM algorithm can be developed. …”
Get full text
Get full text
Article -
5
An Efficient Data Structure for General Tree-Like Framework in Mining Sequential Patterns Using MEMISP
Published 2007“…It has been shown that MEMISP algorithm has outperformed all other algorithms in terms of efficiency and scalability. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Prime-based method for interactive mining of frequent patterns
Published 2010“…Thus far, a few efficient interactive mining algorithms have been proposed. …”
Get full text
Get full text
Thesis -
7
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Cancer Prediction Based On Data Mining Using Decision Tree Algorithm
Published 2022“…Many studies have been conducted in order to predict cancer. Different data mining method has showed up with its related algorithms were adopted by different research. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Detection and extraction features for signatures images via different techniques
Published 2019Get full text
Get full text
Conference or Workshop Item -
10
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…Moreover, the proposed model is compared with a pre-developed ANN approach in order to verify the efficiency of the proposed methodology. …”
Get full text
Get full text
Article -
11
Development and applications of metaheuristic algorithms in engineering design and structural optimization / Ali Sadollah
Published 2013“…In addition, two novel optimization methods are developed and presented which are named the mine blast algorithm (MBA) and the water cycle algorithm (WCA). …”
Get full text
Get full text
Thesis -
12
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…This patterns or rules may help to develop better decision-making process. Data mining is primarily used in finance and business environment to extract knowledge from financial, retail, communication and marketing data. …”
Get full text
Get full text
Conference or Workshop Item -
13
Identification of microcalcification in mammographic images / Noor Azliza Abdul Shauti
Published 2008“…By using this identification, it can simulate in flexible images post processing and analysis in easy image management using Java aplication. …”
Get full text
Get full text
Thesis -
14
Accelerated mine blast algorithm for ANFIS training for solving classification problems
Published 2016“…Mine Blast Algorithm (MBA) is newly developed metaheuristic technique. …”
Get full text
Get full text
Article -
15
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
16
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Most of the previous works explore Apriori approach which is not efficient in mining plentiful and long patterns. In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
18
A Comparative Study of FP-growth Variations
Published 2009“…Many algorithms were developed to find those frequent itemsets. …”
Get full text
Get full text
Citation Index Journal -
19
Fitness value based evolution algorithm approach for text steganalysis model
Published 2013“…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
Get full text
Get full text
Article -
20
Setting up a new Radiology Center Technology for improvement : Data mining (Image Mining Technique)
Published 2016“…The latest development of data mining in the field of biomedical imaging integrates the fuzzy logic, neural network and expert system. …”
Get full text
Get full text
Monograph
