Search Results - (( java application customization algorithm ) OR ( pattern estimation mining algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    Expectation maximization clustering algorithm for user modeling in web usage mining system by Mustapha, Norwati, Jalali, Manijeh, Jalali, Mehrdad

    Published 2009
    “…The results also indicate that kind of behavior given by EM clustering algorithm has improved the visit-coherence (accuracy) of navigation pattern mining.…”
    Get full text
    Get full text
    Article
  2. 2

    The discovery of Top-K DNA frequent patterns with approximate method / Nittaya Kerdprasop and Kittisak Kerdprasop by Kerdprasop, Nittaya, Kerdprasop, Kittisak

    Published 2014
    “…These representatives are subsequently used in the main process of frequent pattern mining. Our designed algorithm had been implemented with the Erlang language, which is the functional programming paradigm with inherent support for pattern matching. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Using language-based search in mining large software repositories by Awang Abu Bakar, Normi Sham

    Published 2011
    “…For the purpose of automating the data retrieval from the repository, a parser was written using the Python programming language, and based on the pattern matching algorithm. The retrieved data were later used to estimate the quality of the open source software.…”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4
  5. 5

    Using language-based search in mining large software repositories by Awang Abu Bakar, Normi Sham

    Published 2011
    “…For the purpose of automating the data retrieval from the repository, a parser was written using the Python programming language, and based on the pattern matching algorithm. The retrieved data were later used to estimate the quality of the open source software.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item