Search Results - (( set implementation case algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- implementation case »
- set implementation »
- application mining »
- java application »
- mining algorithm »
- case algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Implementing case-based reasoning approach to framework documentation
Published 2023“…In CBR, reasoning is based on remembering past cases. Genetic algorithm (GA) is used in implementing the CBR's "retrieve", "reuse", and "revise" steps. …”
Conference paper -
8
Low-level hybridization scripting language with dynamic parameterization in PSO-GA / Suraya Masrom
Published 2015“…However, in many cases, implementing the suitable hybrid algorithms for a given optimization problem is a considerably difficult, which in most cases, is time consuming. …”
Get full text
Get full text
Thesis -
9
Similarity distance measure and prioritization algorithm for test case prioritization in software product line testing
Published 2019“…Identified enhancements have been implemented to both techniques for a better adoption of prioritizing SPL test cases. …”
Get full text
Get full text
Get full text
Article -
10
COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM
Published 2023“…To investigate and capture the development of the pandemic, mapper algorithm can be used to visualize and analyse the COVID data set provided by the government. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
A case study on quality of sleep and health using Bayesian networks
Published 2012“…There are several phases involved including implementation of the learning algorithms, integration of prior knowledge through the whitelist argument and arc setting to form directed acyclic graphs. …”
Get full text
Article -
13
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…Algorithms are a captivating use case for visualization. …”
Get full text
Get full text
Get full text
Article -
14
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…This thesis studies multiobjective UTSP consisting of frequency setting, timetabling, simultaneous bus and driver scheduling by applying Multiple Tabu Search (MTS) algorithm. …”
Get full text
Get full text
Thesis -
15
Bayesian Network Classifiers for Damage Detection in Engineering Material
Published 2007“…The methodology used in the thesis to implement the Bayesian network for the damage detection provides a preliminary analysis used in proposing a novel fea- ture extraction algorithm (f-FFE: the f-folds feature extraction algorithm). …”
Get full text
Get full text
Thesis -
16
Implementation of an inverse-model-based control strategy using neural networks on a partially simulated exothermic reactor
Published 2000“…The implementation involved the control of the reactor temperature in the face of set point changes and load disturbances despite the existence of significant plant/model mismatch. …”
Get full text
Get full text
Article -
17
Faculty timetabling using genetic algorithm
Published 2011“…Faculty Timetabling using Genetic Algorithm (FTGA) is an application that generate optimum timetable for faculty.The target user of this application is faculty staff who responsible in generate timetable.The problem statement of the project is many clashing exist in the timetable.Faculty staff needs to solve the clashing manually.This will waste time and it is a problem for staff to solve the clashing.By implement GA,clashing will be reduced.The objective of the project is to develop aprototype in scheduling application for generates an optimum timetable for a faculty.Genetic algorithm will be implemented.The scope of FTGA is Faculty of Computer Systems & Software Engineering (FCSSE).The methodology use in this project is prototype model.The testing result show 95 out of 100 test cases achieved the maximum fitness value which means there is no clashing in the timetable.The maximum generation is set to 15 generation.Population for each generation is 3 populations.Percentage of FTGA solve the problem is 95%.…”
Get full text
Get full text
Undergraduates Project Papers -
18
Implementing BiSM and CCL algorithm for managing audio storage
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Case Slicing Technique for Feature Selection
Published 2004“…Case Slicing Technique (CST) helps in identifying the subset of features used in computing the similarity measures needed by classification algorithms. …”
Get full text
Get full text
Thesis -
20
Quantum Processing Framework And Hybrid Algorithms For Routing Problems
Published 2010“…For this purpose, some gates and connections were projected in the framework which could be applied for future quantum algorithms. Furthermore, the framework was set up, implemented and simulated for the existing quantum algorithms on a classic computer. …”
Get full text
Get full text
Thesis
