Search Results - (( making causing problems algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- causing problems »
- java application »
- mining algorithm »
- making causing »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Tolerable Constructive Graph-Based Hyper-Heuristic Algorithm For Examination Timetabling
Published 2009“…The main cause for the local optimal problem is that heuristic algorithms either focus on exploration (global improvement) rather than exploitation (local improvement) or vice versa.…”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
-
10
Design of a flexible digital baseband signal processing algorithm
Published 2006“…In this paper, we show how we solved the problem by satisfying several requirements simultaneously: 1) removing loop or complicated algorithm in DBSP functions with flexible DBSP algorithm 2) using DSP-BIOS Scheduling module to increase performance and make sure our sample data are in packed. …”
Get full text
Get full text
Conference or Workshop Item -
11
Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob
Published 2014“…This problem can cause the imbalance in sales. Based on the problem statement, Genetic Algorithm was applied to test whether it is compatible to predict the future sales. …”
Get full text
Get full text
Thesis -
12
Hide information usings cryptography based on android platform / Ahmad Farhan Ahmad Husni
Published 2013“…Man in The Middle Attack (MiTM) can manipulate and give false information to the sender. This problem can cause a big impact to the businessman when they do trading transaction. …”
Get full text
Get full text
Thesis -
13
Ant colony optimization (ACO) algorithm for CNC route problem
Published 2012“…However, the CNC machines do not choose the optimal route when completing their task and this caused the high cost problem on the machining. This project proposes a new optimization technique which applies ant behavior, for finding the optimal route in PCB holes drilling process. …”
Get full text
Get full text
Undergraduates Project Papers -
14
A multiple mitosis genetic algorithm
Published 2023“…Having great advantages on solving optimization problem makes this method popular among researchers to improve the performance of simple Genetic Algorithm and apply it in many areas. …”
Article -
15
A backward recovery mechanism in preemptive utility accrual real time scheduling algorithm
Published 2010“…Problem statement: This study proposed a robust algorithm named as Backward Recovery Preemptive Utility Accrual Scheduling (BRPUAS) algorithm that implements the Backward Recovery(BR) mechanism as a fault recovery solution under the existing utility accrual scheduling environment. …”
Get full text
Get full text
Article -
16
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…Therefore, this work produces a multi-layer dimension reduction algorithm to respond to this need. The algorithm tackles a different root cause of the problem at each layer. …”
Get full text
Get full text
Thesis -
17
Design and Implementation of PID Controller for the Cooling Tower?s pH Regulation Based on Particle Swarm Optimization PSO Algorithm
Published 2025“…The deviation in PH parameter affects the pipes, such as corrosion and scale. Acidic water causes pipes to corrode, and alkaline water causes pipes to scale. …”
Article -
18
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…But the major treat of the IPSec is caused by the usage or the algorithm that has weak keys. …”
Get full text
Get full text
Conference or Workshop Item -
19
Shortest path from Bandar Tun Razak to Berjaya Times Square using Dijkstra Algorithm / Nur Syuhada Muhammat Pazil ... [et al.]
Published 2020“…The time wasted on the road causes a lot of problems to the users. Furthermore, the costs between two destinations are rather expensive. …”
Get full text
Get full text
Get full text
Article -
20
