Search Results - (( structural testing mining algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Mine blast algorithm for optimization of truss structures with discrete variables by Sadollah, Ali, Bahreininejad, A., Eskandar, Hadi, Abd Shukor, Mohd Hamdi

    Published 2012
    “…The efficiency of the proposed optimizer is tested via the optimization of several truss structures with discrete variables and its performance is compared with several well-known metaheuristic algorithms. …”
    Get full text
    Article
  4. 4

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Framework for mining XML format business process log data by Ang, Jin Sheng

    Published 2024
    “…The Flatten Sequential Structure Model (FSSM) was developed to transform tree-structured data into structured, preserving its structural integrity, thus facilitating comprehensive statistical analysis and data mining. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Enhanced ontology-based text classification algorithm for structurally organized documents by Oleiwi, Suha Sahib

    Published 2015
    “…These proposed algorithms were tested on five different scientific paper datasets downloaded from different digital libraries and repositories. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Medical diagnosis using data mining techniques / Shaiful Nizam Zamri by Shaiful Nizam , Zamri

    Published 2003
    “…At the end of this part will reviewed and studied about the mining algorithm the gathered from the research made earlier. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Hybrid ant colony optimization and genetic algorithm for rule induction by Al-Behadili, Hayder Naser Khraibet, Ku-Mahamud, Ku Ruhana, Sagban, Rafid

    Published 2020
    “…The performance of the proposed classifier was tested against other existing hybrid ant-mining classification algorithms namely, ACO/SA and ACO/PSO2 using classification accuracy, the number of discovered rules and model complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy by Ganesh , Krishnasamy

    Published 2019
    “…The proposed algorithm is compared with the state-of-the-art feature selection algorithms using three different datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    An accelerated and accurate three-dimensional ray tracing using red-black tree with facet mining and object bouncing techniques by Islam, M.J., Reza, A.W., Noordin, K.A., Dimyati, K., Kausar, A.M.Z.

    Published 2015
    “…The red-black tree data structure offers a faster object searching operation while repeatedly performing intersection tests. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A hybrid local search algorithm for minimum dominating set problems by Abed, S.A., Rais, H.M., Watada, J., Sabar, N.R.

    Published 2022
    “…Compared to the literature, the proposed algorithm outperformed other algorithms in most of the tested instances. …”
    Get full text
    Get full text
    Article
  18. 18

    A hybrid local search algorithm for minimum dominating set problems by Abed, S.A., Rais, H.M., Watada, J., Sabar, N.R.

    Published 2022
    “…Compared to the literature, the proposed algorithm outperformed other algorithms in most of the tested instances. …”
    Get full text
    Get full text
    Article
  19. 19

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…The necessary steps for the proposed technique are identified, and algorithms of these steps are developed and implemented using Active Server Page (ASP) and then tested on two web pages. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Enhanced mechanism to handle missing data of Hadith classifier by Aldhlan, Kawther A., Zeki, Ahmed M., Zeki, Akram M.

    Published 2011
    “…The correct branch to take is unknown if a feature tested is missing, and the algorithm must employed enhanced mechanisms to handle missing values. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper