Search Results - (( java application among algorithm ) OR ( dramatic representation using algorithm ))
Search alternatives:
- representation using »
- application among »
- java application »
- among algorithm »
- using algorithm »
-
1
-
2
Compact structure representation in discovering frequent patterns for association rules
Published 2002“…Frequent pattern mining is a key problem in important data mining applications, such as the discovery of association rules, strong rules and episodes. Structure used in typical algorithms for solving this problem operate in several database scans and a large number of candidate generation. …”
Get full text
Get full text
Get full text
Article -
3
Compact structure representation in discovering frequent patterns for association rules
Published 2002“…Frequent pattern mining is a key problem in important data mining applications, such as the discovery of association rules, strong rules and episodes. Structure used in typical algorithms for solving this problem operate in several database scans and a large number of candidate generation. …”
Get full text
Get full text
Get full text
Article -
4
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Consequently, The proposed caching scheme, Rough Cultural Algorithm (RCA) is developed to materialise the caching policies.…”
Get full text
Get full text
Article -
5
E-MyKad : An Online Identity Representation System for Malaysia’s Internet Community
Published 2013“…For many years, the online community in the world including Malaysia has increase dramatically. The people are using the internet mostly to interact and socialize with others and to do the online transactions such as selling and buying things. …”
Get full text
Get full text
Final Year Project -
6
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
7
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
8
Group formation using genetic algorithm
Published 2009Get full text
Get full text
Get full text
Get full text
Monograph -
9
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
10
-
11
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. The proposed method can be applied in smart cities, monitoring, health delivery, augmented reality, and gaming among others.…”
Get full text
Get full text
Article -
12
-
13
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…In ELB algorithm, the tasks are distributed among resources based on their execution time range. …”
Get full text
Get full text
Get full text
Thesis -
14
Network monopoly / Tan Kean Yeap
Published 2002“…The possible applications of multimedia-networked system are endless, as the demand to supoort interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
15
-
16
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
-
18
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
Get full text
Get full text
Thesis -
19
-
20
An integrated model of automated elementary programming feedback using assisted and recommendation approach
Published 2017“…This enhancement was evaluated on three ordinal datasets on different application domain covering 67 Java programs, 92 students’ marks on computer architecture subject and 456 EUFA’s football club coefficient ranking list. …”
Get full text
Get full text
Get full text
Get full text
Thesis
