Search Results - (( programming current practices algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- practices »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Online Programming Judge System (UOJ)
Published 2013“…This research conducts a study to build an Online Programming Judge system with a mechanism to generate test cases automatically using Particle Swarm Optimization (PSO) algorithm. …”
Get full text
Get full text
Final Year Project -
9
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…In relation to this, a new theoretical attack such as related-key differential cryptanalysis (RDC) could give rise to a more practical technique. Basically, estimating immunity of lower bounds in the substitution-permutation network (SPN) block ciphers structure against RDC attack is essential for providing a secure block cipher algorithm. …”
Get full text
Get full text
Get full text
Article -
10
-
11
CONTINGENCY ANALYSIS OF POWER SYSTEM NETWORKS
Published 2006“…This project presents an alternative way of conducting power flow analysis in determining the new bus voltages and line currents during outage occurrence. The algorithms have been accommodated in one complete program making it an effective tool for contingency analysis. …”
Get full text
Get full text
Final Year Project -
12
Optimal timber transportation planning in tropical hill forest using bees algorithm
Published 2022“…Given the finding of this study, the optimisation of the BA model has a better performance than the current practice of forest road planning in Malaysia. …”
Get full text
Get full text
Thesis -
13
Analysis Of Human Detection Method In Social Distancing Monitoring
Published 2022“…This study concludes that the use of current proposed object detection algorithms can be used to detect humans and the Euclidean distance method is successfully implemented together with the object detection algorithm…”
Get full text
Get full text
Undergraduates Project Papers -
14
Box-jenkins and genetic algorithm hybrid model for electricity forecasting system
Published 2005“…It also represents a preliminary work in the current research and practices of GA. The investigation is simulated using Intelligent Electricity Forecasting System (IEFS) developed in this research which written in Borland Delphi 7.0 programming.…”
Get full text
Get full text
Thesis -
15
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…The research employs Extreme Programming (XP) methodologies to ensure high-quality code, agility, and collaborative development. …”
Get full text
Get full text
Get full text
Article -
16
Analyzing surface settlement factors in single and twin tunnels : A review study
Published 2024“…The study underscores the importance of proper management of tunneling operations, including optimizing face pressure, to mitigate SS risks. Practical implications for practicing engineers include thorough site investigations, risk assessments and comprehensive monitoring programs. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Forecast of Muslimah fashion trends in Caca's company / Muhammad Saifullah Mohd Taip
Published 2023Get full text
Get full text
Student Project -
18
Assessment of crops healthiness via deep learning approach: Python / Mohamad Amirul Asyraf Mohd Ramli
Published 2023“…This research utilizing the Python programming language and the PyCharm integrated development environment (IDE) to integrate coding into the processing. …”
Get full text
Get full text
Student Project -
19
A simulated annealing approach for redesigning a warehouse network problem
Published 2017“…A Simulated Annealing algorithm is proposed to tackle with the proposed model. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Factors predicting health practitioners' awareness of UNHS program in Malaysian non-public hospitals
Published 2018“…In addition, non-significant relationship between screening techniques and healthcare practitioners' awareness of UNHS program is connected with the fact that the techniques that are practiced among public and non-public hospital are similar and standardized. …”
Get full text
Get full text
Article
