Search Results - (( software optimization tree algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- software optimization »
- application mining »
- optimization tree »
- java application »
- mining algorithm »
- tree algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
An optimized attack tree model for security test case planning and generation
Published 2018“…It involves the use of attack trees for identifying software vulnerabilities at the earliest phase of software development which is critical to successfully protect these applications. …”
Get full text
Get full text
Article -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
-
9
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
10
Evaluation of data mining models for predicting concrete strength
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
The performance effect due to varying network topologies on a software-defined network employing the k-shortest path
Published 2022“…K-shortest paths algorithm discovers a set of paths ordered in the most optimal, optimal, and suboptimal, has a very wide application is integrated into SDN controller to handle routing functionality. …”
Get full text
Get full text
Article -
12
Developing an app for streamlined inventory tracking with barcode scanning and load planning optimization
Published 2025Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Hybrid Neural Network and Decision Tree for for Exchange Rates Forecasting
Published 2012Get full text
Get full text
Conference or Workshop Item -
14
Modeling of static and dynamic components of bio-nanorobotic systems
Published 2012“…In addition, a graph algorithm based on greedy methods is employed to compute a new set of optimal weighted electronic properties of the fullerenes via computing their Minimum Weight Spanning Trees (MWSTs). …”
Get full text
Get full text
Thesis -
15
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
16
Edge assisted crime prediction and evaluation framework for machine learning algorithms
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
A direct ensemble classifier for imbalanced multiclass learning
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Determination of tree stem volume : A case study of Cinnamomum
Published 2013“…Modelling of trees has attracted scientific research in various fields and disciplines since trees and forests play very important roles in the global system. …”
Get full text
Get full text
Get full text
Thesis -
19
Electricity distribution network for low and medium voltages based on evolutionary approach optimization
Published 2015“…This thesis proposes an algorithm to find the optimum distribution substation placement and sizing by utilizing the PSO algorithm and optimum feeder routing using modified Minimum Spanning Tree (MST). …”
Get full text
Get full text
Get full text
Thesis -
20
Optimized Decision Forest for Website Phishing Detection
Published 2021“…Nonetheless, given the dynamism of phishing efforts, there is a constant requirement for novel and efficient website phishing detection solutions. In this study, an optimized decision forest (ODF) method for detecting website phishing is proposed ODF involves the use of a genetic algorithm (GA) for the selection of optimal diverse individual trees in a forest to generate an efficient sub-forest. …”
Get full text
Get full text
Article
