Search Results - (( program using combination algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- combination algorithm »
- application mining »
- java application »
- mining algorithm »
- program using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
An optimal mesh algorithm for remote protein homology detection
Published 2011“…This paper also shows that the use of the refinement algorithm increases the performance of the multiple alignments programs by at least 4%.…”
Get full text
Get full text
Article -
8
A hybrid intelligent algorithm for solving the bilevel programming models
Published 2011Get full text
Working Paper -
9
To enhance existing Malay stemming algorithm starting with the letter 'D' / Mohd Nazril Hafez Mohd Supandi
Published 2000“…First, all the words will used the 1234 combination, and if the program encountered that the words can not be solved correctly, the combination will be shifted to the secondary combination that is 2341. …”
Get full text
Get full text
Thesis -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
An alternative method to solve combined economic emission dispatch problems using flower pollination algorithm
Published 2016“…To simplify the programming, objective of economic dispatch (ED) and emission dispatch (EmD) are combined into a single function by price penalty factor and analysed using weighted sum method to choose the best compromising result. …”
Get full text
Get full text
Thesis -
12
System program management environment in cloud computing using hybrid Genetic Algorithm and Moth Flame Optimization (GA-MFO)
Published 2022“…Optimization algorithms can be used to solve Non-deterministic Polynomial (NP) hard problem like system management. …”
Get full text
Get full text
Get full text
Academic Exercise -
13
Global optimal analysis of variant genetic operations in solar tracking
Published 2023“…Both software and hardware have been developed to simulate related genetic algorithm results using a combination of variant genetic operators. …”
Article -
14
Solving Combined Economic Emission Dispatch Problems Using Multi-objective Hybrid Evolutionary-Barnacles Mating Optimization
Published 2025“…MOHEBMO combines Evolutionary Programming and Barnacles Mating Optimizer to find the best trade-off among conflicting objectives. …”
Conference paper -
15
The use of Cox regression and genetic algorithm (CoRGA) for identifying risk factors for mortality in older people
Published 2004“…CoRGA was used to try and identify the best combination of risk factors for 4-year all-cause mortality. …”
Get full text
Get full text
Get full text
Article -
16
To improve stemming algorithm on Malay words begin with alphabet B / Norasiah Ismail
Published 2001“…First, all the words used the prefix-suffix-prefix suffix-infix combination, and if the program encountered that the words can not be solved correctly, combination will be shifted to the secondary combination that is prefix suffix-suffix-prefix-infix combination. …”
Get full text
Get full text
Thesis -
17
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…One of the progressing works for automated machine learning improvement is the inclusion of evolutionary algorithm such as Genetic Programming. The function of Genetic Programming is to optimize the best combination of solutions from the possible pipelines of machine learning modelling, including selection of algorithms and parameters optimization of the selected algorithm. …”
Get full text
Get full text
Article -
18
Different mutation and crossover set of genetic programming in an automated machine learning
Published 2020“…One of the progressing works for automated machine learning improvement is the inclusion of evolutionary algorithm such as Genetic Programming. The function of Genetic Programming is to optimize the best combination of solutions from the possible pipelines of machine learning modelling, including selection of algorithms and parameters optimization of the selected algorithm. …”
Get full text
Get full text
Article -
19
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The prototype of SEM is constructed based on the modern Smart Meter design and modified with additional control devices and sensors, so that it can measure, record and transfer the data using designated algorithm combining three types of communication system in one device; Wi-Fi, GSM and RF. …”
Get full text
Get full text
Thesis -
20
The study of stemming algorithm on Malay words that begin with alphabets P, Q, Y, and Z from the translated Al-Quran / Suriani Mat
Published 2001“…First, all the words used the 1234 combination, and if the program encountered that the words cannot be solved correctly, combination will be shifted to the secondary combination that is 3124 combination. …”
Get full text
Get full text
Thesis
