Search Results - (( java application mining algorithm ) OR ( chain integration data algorithm ))
Search alternatives:
- application mining »
- chain integration »
- java application »
- mining algorithm »
- integration data »
- data algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Data tampering avoidance for food supply chain traceability system using blockchain technology
Published 2019“…The results showed that the algorithm was able to preserve data integrity up to 100% accuracy.…”
Get full text
Get full text
Thesis -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Data driven hybrid evolutionary analytical approach for multi objective location allocation decisions: Automotive green supply chain empirical evidence
Published 2018“…Data driven hybrid evolutionary analytical approach is proposed by integrating Non-Dominated Sorting Genetic Algorithm-II (NSGA-II) to handle multiple objectives into Differential Evolution (DE) algorithm. …”
Get full text
Get full text
Get full text
Article -
8
Aplikasi rangkaian neural dalam pengesanan simpang bagi penterjemah lakaran pintar
Published 2006“…This research involved three main components - corner detector, chain code, and neural network. The integration of these components produced a corner detector algorithm and this algorithm can be used in the engine of an intelligent sketch interpreter…”
Get full text
Get full text
Thesis -
9
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
10
Optimization of supply chain management by simulation based RFID with XBEE Network
Published 2015“…However, RFID reader is an expensive and has limited data transmission range. It alone cannot transmit data to the main server. …”
Get full text
Get full text
Get full text
Thesis -
11
Integrated supply chain planning under uncertainty using an improved stochastic approach
Published 2011“…This paper proposes an integrated model and a modified solution method for solving supply chain network design problems under uncertainty. …”
Get full text
Get full text
Get full text
Article -
12
Hybrid harmony search-simulated annealing algorithm for location-inventory-routing problem in supply chain network design with defect and non-defect items
Published 2020“…This paper considers a location-inventory-routing problem (LIRP) that integrates the strategic, tactical, and operational decision planning in supply chain network design. …”
Get full text
Get full text
Get full text
Article -
13
A framework for blockchain and internet of things integration in improving food security in the food supply chain
Published 2024“…This work proposes a framework of the integration of blockchain with IoT to improve the reliability of food supply chain (FSC) by focusing on optimizing the consensus algorithm of blockchain. …”
Get full text
Get full text
Article -
14
Development of a two-level trade credit model with shortage for deteriorating products using hybrid metaheuristic algorithm
Published 2015“…A hybrid metaheuristic algorithm which combines Genetic Algorithm (GA) and Particle Swarm Optimization (PSO) algorithm, is then developed to solve the established models. …”
Get full text
Get full text
Thesis -
15
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
16
A review and comparative analysis of predictive models for supply chain demand forecasting
Published 2026“…By synthesizing current research and implementation insights, this work provides a comprehensive evaluation of existing methods, identifying their strengths, limitations, and future research directions to enhance data-driven demand forecasting in modern supply chains.…”
Get full text
Get full text
Get full text
Proceeding Paper -
17
-
18
Healthcare-Chain: Blockchain-Enabled Decentralized Trustworthy System in Healthcare Management Industry 4.0 with Cyber Safeguard
Published 2023“…This article describes a new secure data retention design, prescribed evidence collection, and evaluation mechanism with integrity–confidentiality–availability to enforce the data access control policies for transactions of healthcare microservices. …”
Get full text
Get full text
Get full text
Article -
19
Evaluation of SongketChain : A Framework to Protect Unique Cultural Product using Blockchain Technology
Published 2025“…Quantitatively, the study showcases a 100% improvement in transparency and traceability across the Songket supply chain, effectively integrating over 12 unique data points per product to authenticate and secure the Songket production process from inception to customer delivery.…”
Get full text
Get full text
Get full text
Get full text
Article -
20
The duality of technological innovation and dynamic capabilities: the micro-foundation of China's construction machinery industry's rise up the global value chain
Published 2024“…The study adopts a mixed research method, combining large-scale patent data analysis and in-depth case study, and constructs a longitudinal data set of 146 Chinese construction machinery enterprises from 2005 to 2022. …”
Get full text
Get full text
Get full text
Article
