Search Results - (( java implementation among algorithm ) OR ( strategy implementation mining algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    RARE: mining colossal closed itemset in high dimensional data by Md Zaki, Fatimah Audah, Zulkurnain, Nurul Fariza

    Published 2018
    “…With that, this paper investigated the strategies implemented in both row and column enumerationbased algorithms, hence proposing the RARE; a breadth-first bottom-up row-enumeration algorithm, in mining colossal closed itemsets in high-dimensional data…”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…Depth first strategy and vertical counting strategy are used in mining frequent patterns and computing the support of the patterns respectively. …”
    Get full text
    Get full text
    Thesis
  7. 7

    A novel approach to data mining using simplified swarm optimization by Wahid, Noorhaniza

    Published 2011
    “…Therefore, the proposed SSO rule-based classifier with local search strategies has offered a new paradigm shift in solving complex problems in data mining which may not be able to be solved by other benchmark classifiers.…”
    Get full text
    Get full text
    Thesis
  8. 8

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure by Othman, Mohamad Lutfi

    Published 2011
    “…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
    Get full text
    Get full text
    Thesis
  11. 11

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  12. 12

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Application model of k-means clustering: Insights into promotion strategy of vocational high school by Abadi S., Mat The K.S., Nasir B.M., Huda M., Ivanova N.L., Sari T.I., Maseleno A., Satria F., Muslihudin M.

    Published 2023
    “…Data mining techniques in this initiative were applied to achieve in determining the promotional strategy. …”
    Article
  15. 15
  16. 16

    Propositional satisfiability method in rough classification modeling for data mining by Abu Bakar, Azuraliza

    Published 2002
    “…The improved search strategy implemented the non-chronological backtracking search that potentially prunes the large portion of search space. …”
    Get full text
    Get full text
    Thesis
  17. 17

    The implementation of market basket analysis in menu association model for Corm Café / Nur Amalina Kamarulzaman by Kamarulzaman, Nur Amalina

    Published 2018
    “…To find the frequent item mining, the researcher had proposed some efficient algorithm which is FP-Growth. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Intrusion detection system for the internet of things based on blockchain and multi-agent systems by Liang, Chao, Shanmugam, Bharanidharan, Azam, Sami, Karim, Asif, Islam, Ashraful, Zamani, Mazdak, Kavianpour, Sanaz, Idris, Norbik Bashah

    Published 2020
    “…This research focusses on the design, implementation and testing of an intrusion detection system which uses a hybrid placement strategy based on a multi-agent system, blockchain and deep learning algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
    Get full text
    Get full text
    Thesis