Search Results - (( java general selection algorithm ) OR ( program visualization mining algorithm ))
Search alternatives:
- visualization mining »
- selection algorithm »
- general selection »
- mining algorithm »
- java general »
-
1
Classification of students' performance in computer programming course according to learning style
Published 2024Conference Paper -
2
Decision Tree: Customer churn analysis for a loyalty program using data mining algorithm
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Classification of Students' Performance in Computer Programming Course According to Learning Style
Published 2024Proceedings Paper -
4
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014“…The other 40% of the dataset is used to test generated rules. A simple program of C++ is implemented using Microsoft Visual Studio to test generated rules until accuracy of performance is obtained. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…No previous study has investigated Orange mining tool as visual programming approach in analysing hyperspectral reflectance data, especially in crop disease detection. …”
Get full text
Get full text
Get full text
Article -
7
Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno
Published 2015“…Bibliomining are tools that can visualize how libraries manage their costs, staff activity, customer service, user needs, marketing, popular books, circulation, reference transaction, quality of collection, educational programs etc. …”
Get full text
Get full text
Thesis -
8
A Toolkit for Simulation of Desktop Grid Environment
Published 2014Get full text
Get full text
Final Year Project -
9
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Thesis -
10
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Get full text
Thesis -
11
Classification of Distracted Male Driver Based on Driving Performance Indicator (DPI)
Published 2024“…Weka software was used for “data mining” to get insights from a vast dataset. Weka is a strong data mining and machine learning program including algorithms for data preparation, classification, regression, clustering, and visualization. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Improving Class Timetabling using Genetic Algorithm
Published 2006Get full text
Get full text
Get full text
Thesis -
13
-
14
Evolutionary Music; Composing Beats and Chords Progression
Published 2020Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Visdom: Smart guide robot for visually impaired people
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Classroom finder system with student availability, space and time constraint
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Smart student timetable planner
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
19
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
20
