Search Results - (( using case graph algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- graph algorithm »
- using case »
- case graph »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
-
5
-
6
Application of computer based simulation in gas network system using graph theory algorithms and numerical methods
Published 2007“…This is causing the other graph theory algorithms remain least known to users. …”
Get full text
Get full text
Thesis -
7
On some packing and partition problems in geometric graphs
Published 2018“…It is often useful to restrict the subgraphs of G to a certain graph or property. …”
Get full text
Get full text
Thesis -
8
Regression test case selection & prioritization using dependence graph and genetic algorithm
Published 2014“…Unfortunately, it is costly and time consuming to allow for the re-execution of all test cases during regression testing. The challenge in regression testing is the selection of best test cases from the existing test suite.This paper presents an evolutionary regression test case prioritization for object-oriented software based on extended system dependence graph model of the affected program using genetic algorithm. …”
Get full text
Get full text
Article -
9
COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM
Published 2023“…Several hot spots and significant growth of COVID-19 cases are discovered in states like Selangor and Sarawak through the graphs. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
10
A regression test case selection and prioritization for object-oriented programs using dependency graph and genetic algorithm
Published 2014“…This paper presents an evolutionary regression test case prioritization for object-oriented software based on dependence graph model analysis of the affected program using Genetic Algorithm. …”
Get full text
Get full text
Get full text
Article -
11
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Test case minimization applying firefly algorithm
Published 2018“…Many approaches on test case minimization use genetic algorithms, model checking, or graph search algorithms to reduce the number of generated test cases, also the using of UML diagrams to test the system requirements and design before implementing it in the coding phase.However, these studies lack concentration in achieving higher coverage criteria and minimization in the generated test cases in the same time. …”
Get full text
Get full text
Get full text
Article -
14
An improved algorithm in test case generation from UML activity diagram using activity path
Published 2011“…This paper proposed an improved algorithm to automatically generate test cases directly from UML activity diagram using an activity graph.This algorithm has been implemented as a prototype using UML activity diagrams as inputs to generate test cases.These generated test cases are generated automatically are compared to test cases that are generated manually in order to evaluate the algorithm’s usability and reliability.The result shows that the test cases generated by the developed test case generator program are the same as the one manually derived.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Exploration of COVID‑19 data in Malaysia through mapper graph
Published 2024“…A support vector-based feature selection and a heuristic approach for fine-tuning parameters internally within the algorithm are conducted. Two anomalous groups of nodes with exceptionally high case numbers emerged respectively for Delta and Omicron dominant periods in the Mapper graphs for daily data. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
17
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. …”
Review -
18
A multi-view clustering algorithm for attributed weighted multi-edge directed networks
Published 2022“…Our algorithm first converts the given AWMEDiG into a new weighted graph. …”
Get full text
Get full text
Article -
19
-
20
Laser simulator: a novel search graph-based path planning approach
Published 2018“…In addition, a comparative study on the laser simulator approach, A* algorithm, Voronoi diagram with fast marching and PointBug algorithms was performed to show the benefits and drawbacks of the proposed approach. …”
Get full text
Get full text
Get full text
Article
