Search Results - (( java application designing algorithm ) OR ( a visualization mining algorithm ))
Search alternatives:
- application designing »
- visualization mining »
- designing algorithm »
- java application »
- mining algorithm »
- a visualization »
-
1
A performance analysis of association rule mining algorithms
Published 2016“…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
Get full text
Get full text
Conference or Workshop Item -
2
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…Region growing segmentation and radial basis function algorithms are considered a powerful tool to minimize the mixed pixel classification error.…”
Get full text
Get full text
Conference or Workshop Item -
6
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…The project's objective is identifying the available data mining algorithms in data classification and applying new data mining algorithm to perform classification tasks. …”
Get full text
Get full text
Final Year Project -
7
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
8
Using text mining algorithm to detect gender deception based on Malaysian chatroom lingo / Dianne L.M. Cheong and Nur Atiqah Sia Abdullah@Sia Sze Yieng
Published 2006“…Based on this designed text algorithm, a prototype in Visual Basic is developed. …”
Get full text
Get full text
Research Reports -
9
Using text mining algorithm to detect gender deception based on Malaysian chat room lingo / Dianne L. M. Cheong and Nur Atiqah Sia Abdullah @ Sia Sze Yieng
Published 2006“…Based on this algorithm. a prototype in Visual Basic is developed It was tested with /6 documents; each consists of 5 e-mails exchanges of respective individuals. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014“…Few specific objectives are stated in order to achieve the aim of this research project. This project proposed a data mining technique called Association Rule Mining. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Classification of students' performance in computer programming course according to learning style
Published 2024Conference Paper -
13
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
14
Stock price monitoring system
Published 2024“…As stock price is time series data, a time series prediction algorithm is being utilized to build a deep learning model, namely Long Short-Term Memory (LSTM). …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Development of a new algorithm for segmentation of flotation froth images
Published 2014Get full text
Get full text
Article -
16
-
17
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
18
Fuzzy Soft Set Clustering for Categorical Data
Published 2024Get full text
Get full text
Get full text
Get full text
Article -
19
Decision Tree: Customer churn analysis for a loyalty program using data mining algorithm
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph
