Search Results - (( using claim process algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- process algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
8
Risk analysis of the copula dependent aggregate discounted claims with Weibull inter-arrival time
Published 2021“…We use a copula to represent the dependence structure between the inter-claim arrival time and its subsequent claim amount. …”
Get full text
Get full text
Get full text
Article -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…The static filter range selection algorithm uses a fixed filter range approach to locate the target key, in which the filter range is preset at the beginning of the searching process. …”
Get full text
Get full text
Thesis -
11
Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz
Published 2017“…There are six steps of genetic algorithm. The prototype is useful to worker in construction calculate the total number of parking spaces in the future.…”
Get full text
Get full text
Thesis -
12
Fractional Stochastic Gradient Descent Based Learning Algorithm For Multi-layer Perceptron Neural Networks
Published 2021“…In this study, we propose a learning algorithm for the training of MLP models. Conventionally back-propagation learning algorithm also termed as (BP-MLP) is used. …”
Get full text
Get full text
Conference or Workshop Item -
13
Modeling Earthquake Bond Prices with Correlated Dual Trigger Indices and the Approximate Solution Using the Monte Carlo Algorithm
Published 2025journal::journal article -
14
Encryption selection for WLAN IEEE802.11G
Published 2013“…The impact on throughput and time success can be examined based on encryption algorithms and encryption protocols by using this proposed mechanism. …”
Get full text
Get full text
Thesis -
15
FEATURES EXTRACTION OF FINGERPRINTS BASED ON HYBRID PARTICLE SWARM OPTIMIZATION AND BAT ALGORITHMS
Published 2023“…That means the hybrid (PSO-BA) algorithm has the better results, which means it can be used as one of the best search approaches to extract features from fingerprints � 2022, Authors. …”
Article -
16
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…SOAP is one of the best protocols using XML to exchange message but the XML is too verbose and slows the communication process. …”
Get full text
Get full text
Get full text
Thesis -
17
Effective software fault localization based on complex network theory / Abubakar Zakari
Published 2019“…This has led researchers to adopt approaches such as one bug-at-a-time debugging approach (OBA) and parallel debugging approach. However, using OBA debugging approach increases software time-to-delivery and potentially leads to more faults during regression testing, while utilizing k-mean clustering algorithm with Euclidean distance metric to group failed tests based on their execution profile similarity in parallel debugging approach is claimed to be problematic and inappropriate. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
An evolutionary based features construction methods for data summarization approach
Published 2015“…In other words, this research will discuss the application of genetic algorithm to optimize the feature construction process from the Coral Reefs data to generate input data for the data summarization method called Dynamic Aggregation of Relational Attributes (DARA). …”
Get full text
Get full text
Research Report -
20
Designing substitution boxes based on chaotic map and globalized firefly algorithm
Published 2019“…The FA is a newly developed metaheuristic algorithm inspired by fireflies and their flash lighting process. …”
Get full text
Get full text
Thesis
