Search Results - (( java applications usage algorithm ) OR ( using computing knowledge algorithm ))
Search alternatives:
- computing knowledge »
- applications usage »
- java applications »
- usage algorithm »
- using computing »
-
1
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
3
Overview of metaheuristic: classification of population and trajectory
Published 2010“…Algorithms are used to find the solutions through the computer program. …”
Get full text
Get full text
Monograph -
4
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…With the abundant of knowledge accessible via Internet and the likes, many have ventured into using that knowledge in order to understand deeply on how the available knowledge affected the whole world directly or indirectly. …”
Get full text
Get full text
Thesis -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…The experimental result shows that using Java 2, this method improves the speed of PrefixSpan up to almost two orders of magnitude as well as the memory usage to more than one order of magnitude.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Talent classification using support vector machine technique / Hamidah Jantan, Norazmah Mat Yusof and Mohd Hanapi Abdul Latif
Published 2014“…Data mining is a widely used approach for knowledge discovery in machine learning. …”
Get full text
Get full text
Research Reports -
7
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
8
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Developing an intelligent system to acquire meeting knowledge in problem-based learning environments
Published 2006“…Similarly, the algorithm proposed in MALESAbrain can, be used to deal, the problem of conducting a meeting among learners to solve problems. …”
Get full text
Get full text
Get full text
Article -
11
Ball surface representations using partial differential equations
Published 2015“…Thus, this research develops an algorithm to generalise Ball surfaces from boundary curves using elliptic PDEs. …”
Get full text
Get full text
Get full text
Thesis -
12
Improved BVBUC algorithm to discover closed itemsets in long biological datasets
Published 2019“…Therefore, this paper proposed a method for computing closure compare with the method used in BVBUC algorithm method. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Big data clustering using grid computing and ant-based algorithm
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011Get full text
Get full text
Undergraduates Project Papers -
16
A near-optimal centroids initialization in K-means algorithm using bees algorithm
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof
Published 2019“…One of the key issues of developing an autonomous system is that it requires pre-defined knowledge by an expert. This knowledge is then converted into computer program or by utilizing exhaustively trained and tested Artificial Intelligence (AI) algorithm. …”
Get full text
Get full text
Thesis -
18
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…The proposed algorithm is evaluated using the WorkflowSim simulation with a real dataset. …”
Get full text
Get full text
Thesis -
19
-
20
Cryptanalysis in cryptographic algorithm design
Published 2006Get full text
Conference or Workshop Item
