Search Results - (( java _ implementation algorithm ) OR ( using total ((using algorithm) OR (mining algorithm)) ))

Refine Results
  1. 1

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The system is implemented at UniSZA’s café where two different types of user will use the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob by Yaacob, Siti Hajar

    Published 2014
    “…The objectives of this research are data mining are used to extract useful data from sales and product. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Improved BVBUC algorithm to discover closed itemsets in long biological datasets by Md Zaki, Fatimah Audah, Zulkurnain, Nurul Fariza

    Published 2019
    “…The task in mining closed frequent itemsets requires the algorithm to mine the frequent ones then determine its closure. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Genetic Algorithm for Web Data Mining by Loo, Kevin Teow Aik

    Published 2001
    “…By doing so, it could assist the process of data mining for information in the World Wide Web. This study used a prototype program based on genetic algorithm to manipulate the initial set of data. …”
    Get full text
    Get full text
    Project Paper Report
  8. 8
  9. 9

    Prime-based method for interactive mining of frequent patterns by Nadimi-Shahraki, Mohammad-Hossein

    Published 2010
    “…Moreover, this study introduces a mining algorithm called PC-miner to mine the mining model frequently with various values of minsup. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Batch mode heuristic approaches for efficient task scheduling in grid computing system by Maipan-Uku, Jamilu Yahaya

    Published 2016
    “…We simulate our proposed algorithms using a Java based simulator that is purposedly built for Grid computing simulations. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Prediction Of Leaf Mechanical Properties Based On Geometry Features With Data Mining by H’ng, Choo Wooi

    Published 2019
    “…Findings showed that the numerical predictions on FT and ST (RRSE ~ 25%) were about two folds better than the WT and SWT (RRSE ~50%) in the six algorithms tested. The best prediction performance was gained on FT indicator using the M5P algorithm (RRSE = 22.44%). …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Hybrid tabu search – strawberry algorithm for multidimensional knapsack problem by Wong, Jerng Foong

    Published 2022
    “…Multidimensional Knapsack Problem (MKP) has been widely used to model real-life combinatorial problems. It is also used extensively in experiments to test the performances of metaheuristic algorithms and their hybrids. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…The accuracy for rules and classification resulted from the TIP method are compared with other methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) from Rough Set, Genetic Algorithm (GA), Johnson reducer, HoltelR method, Multiple Regression (MR), Neural Network (NN), Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5); all other classifiers that are mostly used in the classification tasks. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Analysis of Traffic Accident Patterns Using Association Rule Mining by Yudy, Pranata, Tri Basuki, Kurniawan, Edi Surya, Negara, Ahmad Haidar, Mirza

    Published 2024
    “…This study analyzed the levels of minor, moderate, and severe traffic accidents in the Palembang Police area from 2015 to 2020 using association rule mining and the apriori algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    SPATIAL DATA MINING TOOLBOX FOR MAPPING SUITABILITY OF LANDFILL SITES USING NEURAL NETWORKS by Abujayyab, Sohaib K. M., S. Ahamad, Mohd Sanusi, Yahya, Ahmad Shukri, Abdul Aziz, Hamidi

    Published 2016
    “…The multilayer perceptron (MLP) neural networks structure with a backpropagation learning algorithm is used. The dataset is mined from the north states in Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Data mining in mobile ECG based biometric identification by Sidek, Khairul Azami, Mai, Vu, Khalil, Ibrahim

    Published 2014
    “…Subjects in MIT-BIH Normal Sinus Rhythm Database (NSRDB) were used to validate the reliability and stability of the subject recognition methods. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  20. 20