Search Results - (( java application matching algorithm ) OR ( parameter application mining algorithm ))
Search alternatives:
- parameter application »
- application matching »
- application mining »
- java application »
- mining algorithm »
-
1
-
2
-
3
-
4
-
5
Improvement of fuzzy neural network using mine blast algorithm for classification of Malaysian Small Medium Enterprises based on strength
Published 2015“…Mine Blast Algorithm (MBA) which has been improved by Improved MBA (IMBA) can be further improved by modifying its exploitation phase. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
-
9
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
10
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…To date, many works have been addressed in investigating the use of data mining techniques (e.g., Clustering) in Web page application. …”
Get full text
Get full text
Get full text
Thesis -
11
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…There has been a rapid growth in using Artificial Immune Systems for applications in data mining and computational intelligence recently. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
19
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
An improved ACS algorithm for data clustering
Published 2020Get full text
Get full text
Get full text
Article
