Search Results - (( program set ((method algorithm) OR (path algorithm)) ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- method algorithm »
- java application »
- mining algorithm »
- path algorithm »
- program set »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
Optimum Time-Cost Trade-Off Strategies on Critical Path Method for Project Management
Published 2010“…Approach of Crashing Critical Activities (CCA) was originally developed along with the Critical Path Method (CPM) for planning and controlling large scale projects in the late 50s. …”
Get full text
Get full text
Thesis -
3
-
4
PID controller for unmanned aerial vehicle in closed environment using fiducial marker systems
Published 2024“…A Proportional-Integral-Derivative (PID) controller has been established to track the UAV toward the desired path. The navigation algorithm has been programmed in Python and the Robot Operating System (ROS) and implemented in a DJI Tello as an UAV application. …”
Get full text
Get full text
Get full text
Article -
5
Integration of program evaluation and review technique (PERT), gantt chart and genetic algorithm in project management scheduling
Published 2014“…In this thesis, the discussion on the integration approach, which combines Program Evaluation and Review Technique (PERT), Gantt Chart (GC) and Genetic Algorithm (GA), is carried out. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
-
8
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
9
Restoration planning strategy of transmission system based on optimal energizing time of sectionalizing islands / Dian Najihah Abu Talib
Published 2019“…The initial solution is important to guide the optimization methods in finding the optimal solution. There are two discrete optimization techniques used in this work, which are the Artificial Bee Colony algorithm and Evolutionary Programming. …”
Get full text
Get full text
Get full text
Thesis -
10
Propositional satisfiability method in rough classification modeling for data mining
Published 2002“…The classification accuracy, the number of rules and the maximum length of rules obtained from the SIPIDRIP method was compared with other rough set method such as Genetic Algorithm (GA), Johnson, Holte l R, Dynamic and Exhaustive method. …”
Get full text
Get full text
Thesis -
11
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
14
A Feasible Architecture Of Real-Time Collision Avoidance And Path Planning For Semi-Autonomous Unmanned Ground Vehicle (Ugv)
Published 2018“…Therefore, APM is used for navigation before and after approaching obstacles. Path planning algorithm in this project provides the best path to avoid the obstacle and create temporary new waypoints within split seconds. …”
Get full text
Get full text
Monograph -
15
CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences
Published 2023“…This course is an introduction to problem solving using a computer programming language. It emphasizes on algorithm development and writing computer programs, as well as common good practices in writing programs. …”
Get full text
Get full text
Get full text
Teaching Resource -
16
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
17
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019Get full text
Get full text
Thesis -
18
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…Each dataset is set to 10 different problems and the result of the iteration number was as follows: first datasets; new augmentation algorithm = 2, QSM = 4, BLSA = 7, and Simplex = 13 and second datasets; new augmentation algorithm = 1, QSM = 3, BLSA = 4, and Simplex = 8.…”
Get full text
Get full text
Get full text
Thesis -
19
Development of heuristic methods based on genetic algorithm (GA) for solving vehicle routing problem
Published 2008“…Based on the proposed heuristic method, we developed a program to optimize the routing problem using the Visual Studio C++ 6.0 programming language.…”
Get full text
Get full text
Monograph -
20
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…The proposed classifier is called Support Vector Genetic Programming Machine, SVGPM. In order to evaluate the performance of SVGPM against current methods in solving imbalanced classification task, three experiments are conducted such as on selected standard class imbalanced benchmark data sets, intrusion detection system (IDS) data set and remote sensing data set. …”
Get full text
Get full text
Get full text
Thesis
