Search Results - (( future generations mining algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- generations mining »
- testing algorithm »
- mining algorithm »
- java application »
-
1
Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob
Published 2014“…The main purpose of this research to test whether Genetic Algorithm can use to predict future sales and be able generates the graph. …”
Get full text
Get full text
Thesis -
2
HYBRID: an efficient unifying process to mine frequent itemsets
Published 2018“…Algorithms to mine frequent itemsets effectively help in finding association rules and also help in many other data mining tasks. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Discovering association rules for mining images datasets: a proposal
Published 2005“…The Author present a data mining algorithm to find association rules in 2-dimensional colour images. …”
Get full text
Get full text
Conference or Workshop Item -
4
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…This research opens a wide range of future work to be considered, which includes applying the proposed method in other areas such as web mining, text mining or multimedia mining; and extending the proposed approach to work in parallel computing in data mining.…”
Get full text
Get full text
Thesis -
5
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
An initial state of design and development of intelligent knowledge discovery system for stock exchange database
Published 2004“…Generally our clustering algorithm consists of two steps including training and running steps.The training step is conducted for generating the neural network knowledge based on clustering.In running step, neural network knowledge based is used for supporting the Module in order to generate learned complete data, transformed data and interesting clusters that will help to generate interesting rules.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…In conclusion, the proposed algorithm is able to overcome the rare item issue by implementing covariance based support value normalization and high computational costs issue by implementing indexing enumeration tree structure.Future work of this study should focus on rule interpretation to generate more human understandable rule by novice in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
9
Mining Indirect Least Association Rule from Students’ Examination Datasets
Published 2014“…Therefore, in this paper we applied our novel algorithm called Mining Lease Association Rule (MILAR) and our measure called Critical Relative Support (CRS) to mine the indirect least association rule from the students’ examination datasets. …”
Get full text
Get full text
Get full text
Article -
10
Discovering decision algorithm from a distance relay event report
Published 2009“…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. …”
Get full text
Get full text
Get full text
Article -
11
Mining Indirect Least Association Rule from Students' Examination Datasets
Published 2014“…Therefore, in this paper we applied our novel algorithm called Mining Lease Association Rule (MILAR) and our measure called Critical Relative Support (CRS) to mine the indirect least association rule from the students' examination datasets. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Classification with degree of importance of attributes for stock market data mining
Published 2004“…The experimental results show that predictive FDT algorithm can generate a relatively optimal tree without much computation effort (comprehensibility), and WFPRs have a better predictive accuracy of stock market time series data. …”
Get full text
Get full text
Article -
13
-
14
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
15
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…In addition, the algorithms ignore the presence of temporarily irrelevant micro-clusters, which may be relevant in the future. …”
Get full text
Get full text
Thesis -
16
A Data Mining Approach to Enhancing Birth and Death Registration Processes
Published 2025“…The optimal number of clusters of clusters for birth and death data is determined as three using elbow and silhouette validation methods. The apriori algorithm refines registration data by identifying associations that reduce inconsistencies, while decision three analysis highlights critical factors contributing to registrations delays. a total 45 decision trees were generated, leading to policy recommendation aimed at improving data collection and public compliance. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project
