Search Results - (( java its selection algorithm ) OR ( basic computing mining algorithm ))
Search alternatives:
- selection algorithm »
- computing mining »
- mining algorithm »
- basic computing »
- its selection »
- java »
-
1
Modifying iEclat algorithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
2
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
3
Web usage mining for UUM learning care using association rules
Published 2004Get full text
Get full text
Thesis -
4
-
5
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003Get full text
Get full text
Thesis -
6
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
7
DSC766: Text Analytics / College of Computing, Informatics and Mathematics
Published 2020“…Student will learn the basic concepts, principles, and major algorithms in text mining and their potential applications.…”
Get full text
Get full text
Get full text
Teaching Resource -
8
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…This research opens a wide range of future work to be considered, which includes applying the proposed method in other areas such as web mining, text mining or multimedia mining; and extending the proposed approach to work in parallel computing in data mining.…”
Get full text
Get full text
Thesis -
9
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
10
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
11
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…The algorithm consists of three new mechanisms that organize the work of an ant colony i.e. initial pheromone value mechanism, resource selection mechanism and pheromone update mechanism. …”
Get full text
Get full text
Get full text
Monograph -
12
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). …”
Get full text
Get full text
Thesis -
13
-
14
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
17
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Message based random variable length key encryption algorithm.
Published 2009“…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. Encryption and decryption times measured between 5 and 27 m sec in 2 GHz Pentium and java platform so time variant and fast enough key generation had been kept collision and timing attacks away due to small seized storage. …”
Get full text
Get full text
Article -
19
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…We simulate our proposed algorithms using a Java based simulator that is purposedly built for Grid computing simulations. …”
Get full text
Get full text
Get full text
Thesis -
20
