Search Results - (( java application testing algorithm ) OR ( user identification mining algorithm ))
Search alternatives:
- identification mining »
- application testing »
- user identification »
- testing algorithm »
- java application »
- mining algorithm »
-
1
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
3
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
Article -
4
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…Therefore, this paper aims to analyze and cluster the log file data to get useful information that helps understand the users' behavior. A variety of data mining techniques were used to address the problem; three steps of data pre-processing were applied, namely the cleaning of data, the identification of users, and the identification of sessions. …”
Get full text
Get full text
Article -
5
An analysis of text mining factors enhancing the identification of relevant studies
Published 2023“…In this paper, we analyze the literature and identify the text mining factors that influence the identification of relevant studies. …”
Article -
6
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…Secondly, a modified πRKM algorithm is proposed to partition the user session data. …”
Get full text
Get full text
Get full text
Thesis -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
Dominance analyses reduction in skyline query processing over data stream with data mining technique
Published 2025“…DAR employs the Apriori algorithm, one of the most prevalent data mining algorithms, to identify the frequently occurring dominance analyses. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A Machine Learning Classification Application to Identify Inefficient Novice Programmers
Published 2023Conference Paper -
10
Context aware app recommendation using email semantic analysis
Published 2019“…The recommendation system is planned to develop by using data mining and machine learning. The email content as the raw data and sent to the test mining to perform text classification and category the data into differen t categories. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
12
-
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
-
19
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
20
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article
