Search Results - (( java application using algorithm ) OR ( using case ((tree algorithm) OR (new algorithm)) ))
Search alternatives:
- java application »
- using algorithm »
- tree algorithm »
- new algorithm »
- using case »
-
1
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Get full text
Thesis -
2
Case Slicing Technique for Feature Selection
Published 2004“…This new approach called Case Slicing Technique (CST). …”
Get full text
Get full text
Thesis -
3
An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM)
Published 2024“…Therefore, in this study a new optimized variant of machine learning algorithms is presented. …”
Get full text
Get full text
Thesis -
4
An efficient and effective case classification method based on slicing
Published 2006“…The algorithms are: Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5). …”
Get full text
Get full text
Get full text
Article -
5
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…The results from experiments show that handoff latency using the new algorithms is much lower than using AMTree handoff procedure in both cases, i.e. when the source connects to a subscribed base station or not subscribed base station. …”
Get full text
Get full text
Thesis -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
7
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Thesis -
8
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The experimental results showed that the proposed algorithm outperformed both existing algorithms especially for the case of long patterns. …”
Get full text
Get full text
Thesis -
9
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
10
A corrosion prediction model for oil and gas pipeline using CMARPGA
Published 2016“…The decision tree is said optimum in term of the genetic algorithm is used to examine the correlation between a group of association rules instead of using one single rule in predicting a case. …”
Get full text
Get full text
Conference or Workshop Item -
11
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
12
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
Get full text
Get full text
Thesis -
13
Advanced data mining techniques for landslide susceptibility mapping
Published 2021“…SVM, RT, and NBM algorithms were used to produce predicted datasets from the training datasets. …”
Get full text
Get full text
Article -
14
A new history matching sensitivity analysis framework with random forests and Plackett-Burman design
Published 2017“…Hence, parameters with low impact on the history matching error are discarded, and the remaining are used for Genetic Algorithm-based automatic history matching. …”
Get full text
Get full text
Article -
15
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
16
An optimized attack tree model for security test case planning and generation
Published 2018“…By leveraging on the optimized attack tree algorithm used in this research work, the threat model produces efficient test plans from which adequate test cases are derived to ensure a secured web application is designed, implemented and deployed. …”
Get full text
Get full text
Article -
17
Electricity distribution network for low and medium voltages based on evolutionary approach optimization
Published 2015“…This thesis proposes an algorithm to find the optimum distribution substation placement and sizing by utilizing the PSO algorithm and optimum feeder routing using modified Minimum Spanning Tree (MST). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
-
19
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
20
Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing
Published 2015“…Numerous OBIA attributes were explored using the C4.5 algorithm on the Universiti Putra Malaysia (with 20 bands) and Kuala Lumpur (with 128 bands) hyperspectral images. …”
Get full text
Get full text
Thesis
