Search Results - (( structural testing mining algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Mine blast algorithm for optimization of truss structures with discrete variables by Sadollah, Ali, Bahreininejad, A., Eskandar, Hadi, Abd Shukor, Mohd Hamdi

    Published 2012
    “…The efficiency of the proposed optimizer is tested via the optimization of several truss structures with discrete variables and its performance is compared with several well-known metaheuristic algorithms. …”
    Get full text
    Article
  2. 2

    Framework for mining XML format business process log data by Ang, Jin Sheng

    Published 2024
    “…The Flatten Sequential Structure Model (FSSM) was developed to transform tree-structured data into structured, preserving its structural integrity, thus facilitating comprehensive statistical analysis and data mining. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Enhanced ontology-based text classification algorithm for structurally organized documents by Oleiwi, Suha Sahib

    Published 2015
    “…These proposed algorithms were tested on five different scientific paper datasets downloaded from different digital libraries and repositories. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Medical diagnosis using data mining techniques / Shaiful Nizam Zamri by Shaiful Nizam , Zamri

    Published 2003
    “…At the end of this part will reviewed and studied about the mining algorithm the gathered from the research made earlier. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Hybrid ant colony optimization and genetic algorithm for rule induction by Al-Behadili, Hayder Naser Khraibet, Ku-Mahamud, Ku Ruhana, Sagban, Rafid

    Published 2020
    “…The performance of the proposed classifier was tested against other existing hybrid ant-mining classification algorithms namely, ACO/SA and ACO/PSO2 using classification accuracy, the number of discovered rules and model complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…The proposed algorithm is compared with the state-of-the-art feature selection algorithms using three different datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    An accelerated and accurate three-dimensional ray tracing using red-black tree with facet mining and object bouncing techniques by Islam, M.J., Reza, A.W., Noordin, K.A., Dimyati, K., Kausar, A.M.Z.

    Published 2015
    “…The red-black tree data structure offers a faster object searching operation while repeatedly performing intersection tests. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    A hybrid local search algorithm for minimum dominating set problems by Abed, S.A., Rais, H.M., Watada, J., Sabar, N.R.

    Published 2022
    “…Compared to the literature, the proposed algorithm outperformed other algorithms in most of the tested instances. …”
    Get full text
    Get full text
    Article
  12. 12

    A hybrid local search algorithm for minimum dominating set problems by Abed, S.A., Rais, H.M., Watada, J., Sabar, N.R.

    Published 2022
    “…Compared to the literature, the proposed algorithm outperformed other algorithms in most of the tested instances. …”
    Get full text
    Get full text
    Article
  13. 13

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…The necessary steps for the proposed technique are identified, and algorithms of these steps are developed and implemented using Active Server Page (ASP) and then tested on two web pages. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhanced mechanism to handle missing data of Hadith classifier by Aldhlan, Kawther A., Zeki, Ahmed M., Zeki, Akram M.

    Published 2011
    “…The correct branch to take is unknown if a feature tested is missing, and the algorithm must employed enhanced mechanisms to handle missing values. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  15. 15

    Multi agent and artificial neural networks prediction framework development for stock investment strategy by Phang, Wai San

    Published 2016
    “…WMA comprises of an algorithm for web mining which enables it to mine and extract semi-structured information and create new structured information using ontology. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Multi-agent and artificial neural networks prediction framework development for stock investment strategy by Phang, Wai San

    Published 2016
    “…WMA comprises of an algorithm for web mining which enables it to mine and extract semi-structured information and create new structured information using ontology. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis by Abujayyab, Sohaib K. M.

    Published 2017
    “…An accuracy of 99.2% was achieved for the test dataset. The final structure of the trained network was used to produce the suitability index map. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  19. 19
  20. 20