Search Results - (( java implementation some algorithm ) OR ( using case mining algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…Case Slicing Technique (CST) helps in identifying the subset of features used in computing the similarity measures needed by classification algorithms. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Dhany, Saputra

    Published 2008
    “…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
    Get full text
    Thesis
  5. 5

    Frequent Lexicographic Algorithm for Mining Association Rules by Mustapha, Norwati

    Published 2005
    “…The mined frequent patterns are then used in generating association rules. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection by Saputra , Dhany, Rambli, Dayang R.A., Foong, Oi Mean

    Published 2008
    “…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Sequential pattern mining using PrefixSpan with pseudoprojection and separator database by Saputra, D., Rambli, D.R.A., Foong, Oi Mean

    Published 2008
    “…Sequential pattern mining is a new branch of data mining science that solves inter-transaction pattern mining problems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9
  10. 10

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Design and Implementation of Data-at-Rest Encryption for Hadoop by Wan Nor Shuhadah, Wan Nik, Mohamad Afendee, Mohamed, Zarina, Mohamad, Siti Hanisah, Kamaruzaman

    Published 2017
    “…It is shown that the implementation of AES encryption algorithm is capable to secure data stored in HDFS to some extent.…”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Prediction of college student academic performance using data mining techniques. by Abd Jalil, Azura, Mustapha, Aida, Santa, Dzulizah, Zain, Nurul Zaiha, Radwan, Rizalina

    Published 2013
    “…The classification algorithms used are the Decision Tree, Naïve Bayesian, and Multilayer Perception with the highest classification accuracy by the Naive Bayes algorithm with accuracy of 95.3%. …”
    Get full text
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15

    A partition based feature selection approach for mixed data clustering / Ashish Dutt by Ashish , Dutt

    Published 2020
    “…One such pre-processing algorithm in EDM is clustering. It is a widely used method in data mining to discover unique patterns in underlying data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  18. 18

    Data Mining Analysis Of Chronic Kidney Disease (CKD) Level by Mohd Harizi, Muhammad Hafizam Afiq

    Published 2022
    “…Adding the uncertain class the best accuracy obtained was 98.5% using the SMO algorithm. A predictive classification model that determines the accuracy for three classification classes was developed accordingly using the SMO algorithm.…”
    Get full text
    Get full text
    Monograph
  19. 19

    Implementation of RIO in UMJaNetSim / Chan Chin We by Chan, Chin We

    Published 2004
    “…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma by -, Sunardi, -, Abdul Fadlil, Perdana Kusuma, Nur Makkie

    Published 2023
    “…The data collection method in this study uses data mining technology on structured and unstructured data. …”
    Get full text
    Get full text
    Article