Search Results - (( java implementation a algorithm ) OR ( using case ((using algorithm) OR (mining algorithm)) ))
Search alternatives:
- java implementation »
- implementation a »
- mining algorithm »
- using algorithm »
- a algorithm »
- using case »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005“…These aspects are important for the examination can be done in a smooth way and no students can sit more than one exam in a same time slot. …”
Get full text
Get full text
Thesis -
3
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…The main goal of this study is to obtain optimum results that satisfy the minimum completion time and achieve better utilization of resources, which lead to increased throughput. The algorithms were implemented in a Java environment. Results were discussed and analyzed by using formulas and were compared in percentages. …”
Review -
4
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…To help engineers select the best metaheuristic algorithms for their problems, there is a need to evaluate the performance of different metaheuristic algorithms against each other using common case studies. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO
Published 2005“…These aspects are important for the examination can be done in a smooth way and no students can sit more than one exam in a same time slot. …”
Get full text
Get full text
Get full text
Thesis -
6
Case Slicing Technique for Feature Selection
Published 2004“…Case Slicing Technique (CST) helps in identifying the subset of features used in computing the similarity measures needed by classification algorithms. …”
Get full text
Get full text
Thesis -
7
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The mined frequent patterns are then used in generating association rules. …”
Get full text
Get full text
Thesis -
8
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
10
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Thesis -
11
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
12
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Get full text
Thesis -
13
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. …”
Get full text
Get full text
Get full text
Article -
14
Sequential pattern mining using PrefixSpan with pseudoprojection and separator database
Published 2008“…Future research includes exploring the use of Separator Database in PrefixSpan with pseudoprojection to improve mining constrained sequential patterns. …”
Get full text
Get full text
Conference or Workshop Item -
15
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
16
A partition based feature selection approach for mixed data clustering / Ashish Dutt
Published 2020“…One such pre-processing algorithm in EDM is clustering. It is a widely used method in data mining to discover unique patterns in underlying data. …”
Get full text
Get full text
Get full text
Thesis -
17
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
18
The disruptometer: an artificial intelligence algorithm for market insights
Published 2019“…Out of 4 brand use cases, 3 obtained identical results with the analysts ‘studies.…”
Get full text
Get full text
Get full text
Get full text
Article -
19
Dropping down the maximum item set: improving the stylometric authorship attribution algorithm in the text mining for authorship investigation
Published 2010“…In this study, we propose an authorship attribution algorithm, improving the accuracy of Stylometric features of different professionals so it can be discriminated nearly as well as fingerprints of different persons using authorship attributes. …”
Get full text
Get full text
Article -
20
An efficient and effective case classification method based on slicing
Published 2006“…The paper also discusses two of common classification algorithms that are used either in data mining or in general AI. …”
Get full text
Get full text
Get full text
Article
