Search Results - (( program e mining algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- mining algorithm »
- java application »
- program e »
- e mining »
-
1
-
2
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
3
Classification of students' performance in computer programming course according to learning style
Published 2024Conference Paper -
4
Tracking student performance in introductory programming by means of machine learning
Published 2023Conference Paper -
5
IP algorithms in compact rough classification modeling
Published 2001Get full text
Get full text
Get full text
Article -
6
Measuring GPU-accelerated parallel SVM performance using large datasets for multi-class machine learning problem
Published 2023Conference Paper -
7
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Exploring frogeye leaf spot disease severity in soybean through hyperspectral data analysis and machine learning with Orange Data Mining
Published 2025“…No previous study has investigated Orange mining tool as visual programming approach in analysing hyperspectral reflectance data, especially in crop disease detection. …”
Get full text
Get full text
Get full text
Article -
9
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
10
-
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
12
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A Preemptive behaviour-based malware detection through analysis of API calls sequence inspired by Human Immune System
Published 2024journal::journal article -
14
