Search Results - (( java validation using algorithm ) OR ( program application mining algorithm ))
Search alternatives:
- program application »
- application mining »
- validation using »
- mining algorithm »
- java validation »
- using algorithm »
-
1
-
2
-
3
-
4
Prime-based method for interactive mining of frequent patterns
Published 2010Get full text
Get full text
Thesis -
5
Genetic Algorithm for Web Data Mining
Published 2001Get full text
Get full text
Project Paper Report -
6
-
7
Tracking student performance in introductory programming by means of machine learning
Published 2023Conference Paper -
8
Pattern extraction for programming performance evaluation using directed apriori
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Data mining in network traffic using fuzzy clustering
Published 2003Get full text
Get full text
Thesis -
10
Data mining in network traffic using fuzzy clustering
Published 2003Get full text
Get full text
Thesis -
11
-
12
-
13
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
14
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Using language-based search in mining large software repositories
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
17
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
19
Using language-based search in mining large software repositories
Published 2011Get full text
Get full text
Get full text
Article -
20
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item
