Search Results - (( java application system algorithm ) OR ( software program mining algorithm ))
Search alternatives:
- java application »
- system algorithm »
- software program »
- mining algorithm »
- program mining »
-
1
-
2
Using language-based search in mining large software repositories
Published 2011“…The emergence of the open source repositories has contributed tremendously in the collection of software data. This paper highlights the data retrieval method for mining software from a vast open source software repository, SourceForge. …”
Get full text
Get full text
Get full text
Proceeding Paper -
3
Using language-based search in mining large software repositories
Published 2011“…The emergence of the open source repositories has contributed tremendously in the collection of software data. This paper highlights the data retrieval method for mining software from a vast open source software repository, SourceForge. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Data mining in network traffic using fuzzy clustering
Published 2003Get full text
Get full text
Thesis -
6
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
7
Pattern extraction for programming performance evaluation using directed apriori
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Decision Tree: Customer churn analysis for a loyalty program using data mining algorithm
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Predicting students’ STEM academic performance in Malaysian secondary schools using educational data mining
Published 2023“…Four different data mining classification algorithms which are Random Forest, PART, J48 and Naive Bayes will be used on the dataset. …”
Get full text
Get full text
Thesis -
13
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
14
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…No previous study has investigated Orange mining tool as visual programming approach in analysing hyperspectral reflectance data, especially in crop disease detection. …”
Get full text
Get full text
Get full text
Article -
15
-
16
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
17
-
18
Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan
Published 2013“…The paper focuses on prediction of student learning performance in object oriented programming course using data mining technique based on a dataset obtained from Kolej Poly-Tech Mara (KPTM), Kuantan. …”
Get full text
Get full text
Conference or Workshop Item -
19
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item
