Search Results - (( java location based algorithm ) OR ( program evaluation mining algorithm ))
Search alternatives:
- evaluation mining »
- mining algorithm »
- java »
-
1
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
Get full text
Get full text
Get full text
Article -
2
Case Slicing Technique for Feature Selection
Published 2004“…Finding a good classification algorithm is an important component of many data mining projects. …”
Get full text
Get full text
Thesis -
3
Pattern extraction for programming performance evaluation using directed apriori
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Tracking student performance in introductory programming by means of machine learning
Published 2023Conference Paper -
5
Prime-based method for interactive mining of frequent patterns
Published 2010Get full text
Get full text
Thesis -
6
-
7
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
8
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
9
Predicting students’ STEM academic performance in Malaysian secondary schools using educational data mining
Published 2023“…It proceeds through three phases of Need Analysis, Development of the Model and Evaluation of the Model. Four different data mining classification algorithms which are Random Forest, PART, J48 and Naive Bayes will be used on the dataset. …”
Get full text
Get full text
Thesis -
10
-
11
Measuring GPU-accelerated parallel SVM performance using large datasets for multi-class machine learning problem
Published 2023Conference Paper -
12
-
13
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…No previous study has investigated Orange mining tool as visual programming approach in analysing hyperspectral reflectance data, especially in crop disease detection. …”
Get full text
Get full text
Get full text
Article -
14
Classification models for higher learning scholarship award decisions
Published 2018“…Each model was evaluated using technical evaluation metric, such contingency table metrics, and accuracy, precision, and recall measures. …”
Get full text
Get full text
Get full text
Article -
15
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
-
19
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
20
Web page design for electronic commerce / Lee Fong Wai
Published 2003“…The sixth part covers the system implementation that involved the transformation of modules and algorithm into implementable commands by using the specified programming languages. …”
Get full text
Get full text
Thesis
