Search Results - (( developing strategy mining algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System by Hanafi, Suryana, Nanna, Hasan Basari, Abd Samad

    Published 2017
    “…Further research can provide newer algorithm to handle cold start problem and sparse data from both text mining and mining computation perspectives.…”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Tree-based contrast subspace mining method by Florence Sia Fui Sze

    Published 2020
    “…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Feature selection with integrated Gaussian seahorse optimization data mining for cross-border business cooperation between the Malaysian medical industry and tourism industry by Ma, Yuaner, Jabar, Juhaini, Abdul Aziz, Nor Azah

    Published 2023
    “…The integrated GSH-DM model then applies the Gaussian Seahorse Optimization algorithm to optimize the data mining process, enhancing the accuracy and efficiency of pattern discovery. the GSH-DM model, this study aims to uncover hidden patterns, relationships, and predictive models that can guide decision-making and strategy development for cross-border business cooperation. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  6. 6

    Association Rule Mining Using Market Basket Analysis by Nor Fadilah, Tahar @ Yusoff

    Published 2003
    “…This is because that knowledge discovery is very important to extract the useful knowledge in order to improve marketing strategy. Market Basket Analysis (MBA) is one of data mining techniques thut can be used in marketing strategy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Advanced data mining techniques for landslide susceptibility mapping by Ibrahim, M.B., Mustaffa, Z., Balogun, A.-L., Hamonangan Harahap, I.S., Ali Khan, M.

    Published 2021
    “…Predictive models were also developed by quantifying these models using data mining techniques. …”
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Multi-agent and artificial neural networks prediction framework development for stock investment strategy by Phang, Wai San

    Published 2016
    “…Four types of agents were developed, including the Web Mining Agent (WMA), the Wealth Forecasting Agent (WFA), the Strategy Agent (SA), and the Wealth Planning Agent (WPA). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Multi agent and artificial neural networks prediction framework development for stock investment strategy by Phang, Wai San

    Published 2016
    “…Four types of agents were developed, including the Web Mining Agent (WMA), the Wealth Forecasting Agent (WFA), the Strategy Agent (SA), and the Wealth Planning Agent (WPA). …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Modeling Teacher's Integrity Using Data Mining by Mohd Latifi, Abdul Ghani

    Published 2010
    “…Thus, the aim of this study is to develop a model for teacher's integrity using data mining technique. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance by Tan, Su Sze

    Published 2019
    “…Last but not least, some of the complex data mining tasks are not able to perform because of the limited algorithms and machine learning in Orange software.…”
    Get full text
    Get full text
    Monograph
  15. 15

    GEOSPATIAL TEMPORAL FRAMEWORK ON LANDSLIDES MITIGATION STRATEGIES FOR PIPELINES by IBRAHIM, MUHAMMAD BELLO

    Published 2023
    “…The susceptibility mapping was developed using data mining techniques and remote sensing data. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Forecast of Muslimah fashion trends in Caca's company / Muhammad Saifullah Mohd Taip by Mohd Taip, Muhammad Saifullah

    Published 2023
    “…Alhamdulillah, thanks to Allah, nearly all businesses now require business intelligence technologies in the quickly expanding globalisation era. The development of the best practical strategy by a corporation depends on business intelligence. caca company that provides different types of Muslim clothes. …”
    Get full text
    Get full text
    Student Project
  17. 17

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project