Search Results - (( programming language practices algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- practices »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences
Published 2023“…This course is an introduction to problem solving using a computer programming language. It emphasizes on algorithm development and writing computer programs, as well as common good practices in writing programs. …”
Get full text
Get full text
Get full text
Teaching Resource -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom
Published 2015“…In the scripting language evaluation, nine LLHs and three single PSO algorithms have been successfully created using the scripting languages. …”
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The development process for this simulation is using programming language of Microsoft Visual C I t 6.0 and the coding creation depends on the algorithm flowchart and the formula pseudocode. …”
Get full text
Get full text
Thesis -
11
-
12
The implementation of forward chaining algorithm in calculating inheritance property based on faraid law / Nur Ain Syafiqah Mohammad Marzuki
Published 2021“…The distribution of properties is solved using Python Programming Language and also will verify using Inheritance Calculator Mobile Application. …”
Get full text
Get full text
Student Project -
13
-
14
Scheduling of batch process plant / Abdul Aziz Abu Bakar
Published 1995“…By using Turbo Pascal programming language, major programs are linked and displayed. …”
Get full text
Get full text
Student Project -
15
Optimal forwarding routing protocol in ipv6-based wireless sensor network
Published 2009“…In WSNs, TinyOS is the most widely used operating system. Thus, programming code of the OF routing protocol algorithm is written using NesC language, which is a high level programming language that emulates the syntax and functionality of hardware description languages, and provides components for communication, thread coordination, and hardware abstraction. …”
Get full text
Get full text
Thesis -
16
Facilitating English Language teaching through AI- based drama in Palestine
Published 2025Get full text
Get full text
Get full text
Book Chapter -
17
-
18
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The obvious amount of lost money of victims has led to many court cases where victim and theft claims the ownership of the program and the winner is who has a good lawyer. Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. …”
Get full text
Get full text
Thesis -
19
A flowchart-based multi-agent system for assisting novice programmers with problem solving activities
Published 2023“…The aim is to improve students' problem solving skills and to introduce them to the basic programming algorithms prior to surface structure, using an automatic text-to-flowchart conversion approach. …”
Article -
20
Bayesian network of influence of sociodemographic variables on dengue related knowledge, attitude, and practices in selected areas in Selangor, Malaysia
Published 2019“…The main objective of this research is the novel application of Partial least square path analysis (PLS-PA) to explore the latent sub-constructs of knowledge, attitude, and practices (KAP) on dengue via R programming language. …”
Get full text
Get full text
Thesis
