Search Results - (( process formation mining algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- formation mining »
- mining algorithm »
- java application »
-
1
RELMARK: An innovative algorithm for preprocessing of transactional business data
Published 2015“…Association rule mining is a popular research topic due to many useful applications.The initial task in producing association rule is to ensure that only suitable data formats are fed into the mining process.Providing a correct data format for association rule mining is an essential and crucial task as wrong data will yield wrong results and interpretations.In this research work, an efficient algorithm for converting relational data format into transactional data format is presented.This transactional data format suited the SAS Enterprise Miner Software for association rule mining technique. …”
Get full text
Get full text
Article -
2
Framework for mining XML format business process log data
Published 2024“…This study introduces an alternative approach for mining XML format documents which can be modelled into tree-structured format. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…The mining process entails data cleaning, formatting, filtering, and identifying the candidate keywords. …”
Article -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
The semantics of norms mining in multi-agent systems
Published 2023“…We define the semantics of entities and processes that are involved in the norms mining technique. …”
Conference paper -
6
The semantics of norms mining in multi-agent systems
“…We define the semantics of entities and processes that are involved in the norms mining technique. …”
Get full text
Conference or Workshop Item -
7
Dissimilarity algorithm on conceptual graphs to mine text outliers
Published 2009“…The graphical text representation method such as Conceptual Graphs (CGs) attempts to capture the structure and semantics of documents.As such, they are the preferred text representation approach for a wide range of problems namely in natural language processing, information retrieval and text mining.In a number of these applications, it is necessary to measure the dissimilarity (or similarity) between knowledge represented in the CGs.In this paper, we would like to present a dissimilarity algorithm to detect outliers from a collection of text represented with Conceptual Graph Interchange Format (CGIF).In order to avoid the NP-complete problem of graph matching algorithm, we introduce the use of a standard CG in the dissimilarity computation.We evaluate our method in the context of analyzing real world financial statements for identifying outlying performance indicators.For evaluation purposes, we compare the proposed dissimilarity function with a dice-coefficient similarity function used in a related previous work.Experimental results indicate that our method outperforms the existing method and correlates better to human judgements. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A norms mining approach to norms detection in multi-agent systems
Published 2023“…Due to security issues, access is prevented to one or more of these sources. The norms mining technique entails the process of data formatting and filtering and identifying the norms' components that contribute to the strength of the norms. …”
Conference paper -
9
A norms mining approach to norms detection in multi-agent systems
Published 2012“…Due to security issues, access is prevented to one or more of these sources. The norms mining technique entails the process of data formatting and filtering and identifying the norms' components that contribute to the strength of the norms. …”
Get full text
Conference or Workshop Item -
10
Discovering Pattern in Medical Audiology Data with FP-Growth Algorithm
Published 2012“…We use frequent pattern growth (FP-Growth) algorithm in the data processing step to build the FP-tree data structure and mine it for frequents itemsets. …”
Get full text
Get full text
Conference or Workshop Item -
11
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
12
Automatic clustering of gene ontology by genetic algorithm
Published 2006“…Experimental results and an example of modularized Gene Ontology in RDF/XML format are given to illustrate the effectiveness of the algorithm…”
Get full text
Get full text
Article -
13
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
14
-
15
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
20
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph
