Search Results - (( development ((program e) OR (program a)) algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- program e »
- program a »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Analyzing students’ experience in programming with computational thinking through competitive, physical, and tactile games: The quadrilateral method approach
Published 2021“…The lack of computational thinking (CT) skills can be one of the reasons why students find themselves having difficulties in writing a good program. Therefore, understanding how CT skills can be developed is essential. …”
Get full text
Get full text
Get full text
Article -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
Get full text
Get full text
Thesis -
6
Real-time implementation of H∞ controller for UAV helicopter using MATLAB-based embedded programming approach
Published 2015“…The rapid-prototyping and deployment of flight control algorithm on a real-time embedded target has been one of the major challenges in an unmanned helicopter system development. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
7
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Conference Approval System (e-CoAS) / Nor Hidayah Rahim
Published 2015Get full text
Get full text
Thesis -
11
Optimizing Visual Sensors Placement with Risk Maps Using Dynamic Programming
Published 2022“…Then, the dynamic programming algorithm operates on security quantified maps rather than uniform grids. …”
Get full text
Get full text
Article -
12
Explicit solution of parameter estimate using multiparametric programming for boost converter
Published 2023“…This work proposes an approach to estimate the parameters of capacitance and inductance in a boost converter using an explicit solution. A multiparametric programming (MPP) algorithm is fundamental to the suggested methodology, which aims to develop parameters as explicit functions of measurements. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Implementation of color filtering on FPGA
Published 2007“…The chosen image processing algorithm is a single Color Filtering algorithm. This work utilizes Altera DE2 development board empowered by the Cyclone II FPGA paired with a 1.3 Mega pixel CMOS camera from Terasik Technologies. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Solving Unit Commitment Problem Using Multi-agent Evolutionary Programming Incorporating Priority List
Published 2023“…This paper presents an approach to solve the unit commitment problem using a newly developed Multi-agent Evolutionary Programming incorporating Priority List optimisation technique (MAEP-PL). …”
Article -
16
Fast approach for automatic data retrieval using R programming language
Published 2017“…The developed algorithm performs data retrieval using a source file and a map file as inputs and produces a desired output file. …”
Get full text
Get full text
Article -
17
-
18
-
19
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
20
Chaotic mutation immune evolutionary programming for voltage security with the presence of DGPV
Published 2023“…Chaotic Mutation Immune Evolutionary Programming (CMIEP) is developed by integrating the piecewise linear chaotic map (PWLCM) in the mutation process in order to increase the convergence rate of the algorithm. …”
Article
