Search Results - (( development teams function algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- function algorithm »
- application mining »
- development teams »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Some metaheuristic algorithms for solving multiple cross-functional team selection problems
Published 2022“…We compared the developed algorithms with the MIQP-CPLEX solver on 500 programming contestants with 37 skills and several randomized distribution datasets. …”
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Digital assistant for workspace apps
Published 2022“…The problem is that way too many functions to be configured or used in the Microsoft Teams consider time waste to achieve a task with many steps. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Estimation of the denitrification in the lower Mississippi Valley
Published 2001“…The CREAMS denitrification algorithm was modified to account for the high soil moisture conditions by incorporating a water function.The average annual denitrification value simulated by using modified algorithm was higher than the one predicted by CREAMS algorithm.This result is expected because the modified algorithm uses a water function to reflect the degree of soil saturation.…”
Get full text
Get full text
Conference or Workshop Item -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
Collaboration algorithms between intermediaries for supporting flexible supply chain management
Published 2013“…The authors introduce Integrative Information Management Architecture (IIMA) running on collaboration algorithms which create semi automated intermediary processes to support management team address integration challenges. …”
Get full text
Get full text
Get full text
Article -
12
Fuzzy adaptive emperor penguin optimizer for global optimization problems
Published 2023“…The Emperor Penguin Optimizer (EPO) is a recently developed population-based metaheuristic algorithm that simulates the huddling behaviour of emperor penguins. …”
Get full text
Get full text
Thesis -
13
Development of a task-oriented, auction-based task allocation framework for a heterogeneous multirobot system
Published 2020“…The developed framework consists of a novel heuristic-based task allocation algorithm and communication module. …”
Get full text
Get full text
Get full text
Article -
14
A collaborative model for post flood activities exploiting an enhanced expanding neighborhood search algorithm
Published 2019“…The desirable functionalities of CP-AGCM are showcased through formulation and development of an efficient global search strategy exploiting a wide range of collaboration among network agents. …”
Get full text
Get full text
Thesis -
15
Rangka kerja keselamatan transaksi bagi pelanggan pelayan berasaskan perdagangan elektronik
Published 2003“…WebDID is an alternative method to protect web server by detecting unauthorised changes in web and sending an intrusion alarm directly to web server administrator. Hashing function implementation have been using in this system as its cryptography algorithm. …”
Get full text
Get full text
Monograph -
16
User to user topic recommendation model for student social interaction
Published 2025“…This predictive analytics model compared single and multi-classifier accuracy in predicting the importance of a topic for an individual. Then, a newly developed algorithm called the Social Recommendation (SAR) algorithm ranked and recommended the best topic for social interaction. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
An experimental study of a fuzzy adaptive emperor penguin optimizer for global optimization problem
Published 2022“…Emperor Penguin Optimizer (EPO) is a recently developed population-based meta-heuristic algorithm that simulates the huddling behavior of emperor penguins. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Crowdsource requirements engineering: Using online reviews as input to software features clustering
Published 2024journal::journal article -
20
Crowdsource requirements engineering: Using online reviews as input to software features clustering
Published 2017“…This information can be valuable for software development teams to enhance the software functionalities in the next releases. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
