Search Results - (( software visualization learning algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- visualization learning »
- learning algorithm »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Algorithm-program visualization model : An intergrated software visualzation to support novices' programming comprehension
Published 2015“…Mostly, conventional programming courses have been delivered based on the programming textbooks with professional developer tools which focus on the syntax or semantic through the coding task. The role of Software Visualization (SV) has been involved to overcome the complexity and problems in the learning programming. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Parse tree visualization for Malay sentence (BMTutor)
Published 2015“…In terms of technology, to date, there is no computer software or a prototype that is available that can help students in learning the BM sentence structure.Thus, BMTutor is introduced as a solution to this problem. …”
Get full text
Get full text
Get full text
Article -
6
Smart object detection using deep learning algorithm and jetson nano for blind people
Published 2021Get full text
Get full text
Conference or Workshop Item -
7
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Postsurgery classification of best-corrected visual acuity changes based on Pterygium Characteristics using the Machine Learning Technique
Published 2021“…Conclusion. Machine learning algorithms can produce a highly accurate postsurgery classification model of BCVA changes using pterygium characteristics.…”
Get full text
Get full text
Get full text
Get full text
Article -
10
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
11
Visual codebook analysis in image understanding / Hoo Wai Lam
Published 2015Get full text
Get full text
Thesis -
12
Effectiveness of algorithm visualisation in studying complex algorithms: a case study using TRAKLA Ravie / Chandren Muniyandi, Ali Maroosi
Published 2015“…TRAKLA2 is a visualisation tool used to enhance the process of learning algorithm construction and optimization. To assess the effectiveness of TRAKLA2, students were given an algorithm test prior to being introduced to the software. …”
Get full text
Get full text
Get full text
Article -
13
Hybrid sampling and random forest machine learning approach for software detect prediction
Published 2019“…Cross validation is used to remove overriding problem. Scikit-learn library is used for machine learning algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Malware visualizer: A web apps malware family classification with machine learning
Published 2021Get full text
Get full text
Conference or Workshop Item -
16
Enhancing understanding of programming concepts through physical games
Published 2017“…The motivation behind this approach is firstly based on learning style theories that many students are of the kinaesthetic typed compared to the visual and auditory and this is also true in the context of computer science students. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
-
20
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis
