Search Results - (( java implementation modified algorithm ) OR ( making program mining algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- mining algorithm »
- making program »
- program mining »
-
1
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
Get full text
Get full text
Get full text
Article -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…The methods that wilt be applied are conventional statistical methods Markowitz Optimization as well as evolutionary programming (EP) utilizing genetic algorithms. The result of this project are expected to be a comparison of the used methods that will give an indication how well evolutionary programming can perform relative to conventional method and how good the results of the data mining process.…”
Get full text
Get full text
Conference or Workshop Item -
4
Prime-based method for interactive mining of frequent patterns
Published 2010Get full text
Get full text
Thesis -
5
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
6
Data mining in network traffic using fuzzy clustering
Published 2003Get full text
Get full text
Thesis -
7
Data mining in network traffic using fuzzy clustering
Published 2003Get full text
Get full text
Thesis -
8
Decision Tree: Customer churn analysis for a loyalty program using data mining algorithm
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
10
Forecast of Muslimah fashion trends in Caca's company / Muhammad Saifullah Mohd Taip
Published 2023Get full text
Get full text
Student Project -
11
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
12
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
13
Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno
Published 2015“…Bibliomining are tools that can visualize how libraries manage their costs, staff activity, customer service, user needs, marketing, popular books, circulation, reference transaction, quality of collection, educational programs etc. Similar data mining techniques are suggested to be employed in different library settings and even enterprises as to make more effective use of organizational resources…”
Get full text
Get full text
Thesis -
14
-
15
-
16
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
17
Classification models for higher learning scholarship award decisions
Published 2018“…In addition, the knowledge analysis of the decision tree model was also made and found that some new information derived from the acquisition of this research information may help the stakeholders in making new policies and scholarship programs in the future.…”
Get full text
Get full text
Get full text
Article -
18
Extracting Tweets Using R in The Context of Ethical Issues
Published 2021“…The analysis was carried out with a simple algorithm written in R Programming. 45 keywords based on Ibn Khaldun’s thoughts were constructed as the hashtag to retrieve data from Twitter. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
20
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…Meanwhile, the second MAS model has been designed using two agents as follows: the first agent is a fault current agent that is to determine the fault current at all points before and after grounding; the second agent is the time operating of the agent which is used to determine the relay operating time before and after modifying fault current. The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis
