Search Results - (( java implementation some algorithm ) OR ( knowledge generation patterns algorithm ))
Search alternatives:
- knowledge generation »
- java implementation »
- implementation some »
- generation patterns »
- some algorithm »
-
1
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
A frequent pattern mining algorithm based on FP-growth without generating tree
Published 2010Get full text
Get full text
Conference or Workshop Item -
4
A frequent pattern mining algorithm based on FP-growth without generating tree
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Discovering Pattern in Medical Audiology Data with FP-Growth Algorithm
Published 2012“…There is potential knowledge inherent in vast amounts of untapped and possibly valuable data generated by healthcare providers. …”
Get full text
Get full text
Conference or Workshop Item -
6
Comparison between Market Basket Analysis and Partition Around Medoids clustering for knowledge discovering in consumer consumption pattern / Mohammad Adha Ruslan, Nurul Shahira Mo...
Published 2019“…The main purpose of this study are to compare the knowledge discovery between Market Basket Analysis and Partition Around Medoids and followed by to generate a customer buying pattern by using Market Basket Analysis (MBA) Algorithm and Partition Around Medoids (PAM) Clustering Algorithm. …”
Get full text
Get full text
Student Project -
7
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The primary concept of association rule algorithms consist of two phase procedure. In the first phase, all frequent patterns are found and the second phase uses these frequent patterns in order to generate all strong rules. …”
Get full text
Get full text
Thesis -
8
Performance of IF-Postdiffset and R-Eclat Variants in Large Dataset
Published 2018“…The multiple variants in the R-Eclat algorithm generate varied performances in infrequent mining patterns. …”
Get full text
Get full text
Article -
9
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
10
Biopattern: a biomimetic design framework for generating bio-inspired design (biomimicry)
Published 2020“…The objective of this research is to develop a biomimetic design framework, BioPattern, which bridges this knowledge gap. BioPattern constitutes of TRIZ, SAPPhIRE, and pattern language. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
12
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
Get full text
Get full text
Conference or Workshop Item -
13
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
14
-
15
Comparative study of apriori-variant algorithms
Published 2016“…However, the algorithm suffers from scanning time problem while generating candidates of frequent itemsets.This study presents a comparative study between several Apriori-variant algorithms and examines their scanning time.We performed experiments using several sets of different transactional data.The result shows that the improved Apriori algorithm manage to produce itemsets faster than the original Apriori algorithm.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
An initial state of design and development of intelligent knowledge discovery system for stock exchange database
Published 2004“…Generally our clustering algorithm consists of two steps including training and running steps.The training step is conducted for generating the neural network knowledge based on clustering.In running step, neural network knowledge based is used for supporting the Module in order to generate learned complete data, transformed data and interesting clusters that will help to generate interesting rules.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
A Scalable Algorithm for Constructing Frequent Pattern Tree
Published 2014“…In typical FP-Tree construction, besides the prior knowledge on support threshold, it also requires two database scans; first to build and sort the frequent patterns and second to build its prefix paths. …”
Get full text
Get full text
Get full text
Article -
18
Discovering association rules for mining images datasets: a proposal
Published 2005“…Finally, the association rules will determine using an adaptation of the Apriori Algorithm. The proposed approach is applied to an image datasets to demonstrate the kinds of knowledge and association rules to discover interesting patterns and new knowledge. …”
Get full text
Get full text
Conference or Workshop Item -
19
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
20
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis
