Search Results - (( java operation research algorithm ) OR ( software visualization mining algorithm ))
Search alternatives:
- visualization mining »
- research algorithm »
- mining algorithm »
- java operation »
-
1
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007Get full text
Get full text
Conference or Workshop Item -
2
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…No previous study has investigated Orange mining tool as visual programming approach in analysing hyperspectral reflectance data, especially in crop disease detection. …”
Get full text
Get full text
Get full text
Article -
4
-
5
Decision Tree: Customer churn analysis for a loyalty program using data mining algorithm
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Fuzzy Soft Set Clustering for Categorical Data
Published 2024Get full text
Get full text
Get full text
Get full text
Article -
7
Data mining and analysis for predicting electrical energy consumption
Published 2024“…This classification was done using data mining (five algorithms in specific) and data analysis theory. …”
Article -
8
Unapparent information revelation for counterterrorism: Visualizing associations using a hybrid graph-based approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Improving Class Timetabling using Genetic Algorithm
Published 2006“…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis -
10
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Classification of Distracted Male Driver Based on Driving Performance Indicator (DPI)
Published 2024“…Weka is a strong data mining and machine learning program including algorithms for data preparation, classification, regression, clustering, and visualization. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…The genetic algorithm approach that been used in this research has been proven by other research study before that it will easily handle this types of problem where the optimal solution will be generated. …”
Get full text
Get full text
Thesis -
13
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
14
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Besides that, the system will build in Windows 2000 Professional Operating System. The project approaches the research and development process as a two dimensional recognition problem, capturing the face image by using the web camera. …”
Get full text
Get full text
Thesis -
15
Efficient and effective automated surveillance agents using kernel tricks
Published 2012“…Kernel machines provide a powerful data mining technique that may be used for pattern matching in the presence of complex data. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Text messaging encryption system
Published 2012“…The programming language that is used to write the program is Java Language.…”
Get full text
Get full text
Undergraduates Project Papers -
17
Graphical user interface for bounded-addition fuzzy splicing systems and their variants / Mathuri Selvarajoo ... [et al.]
Published 2023“…An algorithm is developed using JAVA and Visual Studio Code software in order to replace the time-consuming manual computation of the languages generated by bounded-addition fuzzy DNA splicing systems and their variants.…”
Get full text
Get full text
Article -
18
-
19
-
20
Splicing system and their variants with fuzzy algebraic sum / Mohd Pawiro Santono Othman
Published 2023“…This research discusses the concept of biological systems in Deoxyribonucleic Acid (DNA) which involves formal language theory namely splicing system. …”
Get full text
Get full text
Thesis
