Search Results - (( java implementation case algorithm ) OR ( strategy implementation mining algorithm ))
Search alternatives:
- strategy implementation »
- implementation mining »
- java implementation »
- implementation case »
- mining algorithm »
- case algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
RARE: mining colossal closed itemset in high dimensional data
Published 2018“…With that, this paper investigated the strategies implemented in both row and column enumerationbased algorithms, hence proposing the RARE; a breadth-first bottom-up row-enumeration algorithm, in mining colossal closed itemsets in high-dimensional data…”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
5
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…Depth first strategy and vertical counting strategy are used in mining frequent patterns and computing the support of the patterns respectively. …”
Get full text
Get full text
Thesis -
6
-
7
A novel approach to data mining using simplified swarm optimization
Published 2011“…Therefore, the proposed SSO rule-based classifier with local search strategies has offered a new paradigm shift in solving complex problems in data mining which may not be able to be solved by other benchmark classifiers.…”
Get full text
Get full text
Thesis -
8
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Finding objects with segmentation strategy based multi robot exploration in unknown environment
Published 2013“…Both algorithm implemented and analyzed in Player/Stage simulation. …”
Get full text
Get full text
Get full text
Article -
10
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005Get full text
Get full text
Thesis -
11
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
12
Java based expert system for selection of natural fibre composite materials
Published 2013“…In this paper, we develop a technology for the materials selection system using Java based expert system. The weighted-range method (WRM) was implemented to identify the range value and to scrutinise the candidate materials. …”
Get full text
Get full text
Get full text
Article -
13
-
14
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
Review -
15
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Discovering decision algorithm from a distance relay event report
Published 2009“…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. …”
Get full text
Get full text
Get full text
Article -
17
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
18
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
19
Application model of k-means clustering: Insights into promotion strategy of vocational high school
Published 2023“…Data mining techniques in this initiative were applied to achieve in determining the promotional strategy. …”
Article -
20
Propositional satisfiability method in rough classification modeling for data mining
Published 2002“…The improved search strategy implemented the non-chronological backtracking search that potentially prunes the large portion of search space. …”
Get full text
Get full text
Thesis
