Search Results - (( variable interactions search algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- variable interactions »
- application mining »
- java application »
- mining algorithm »
- search »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
A new variable strength t-way strategy based on the cuckoo search algorithm
Published 2019“…Complementing existing works, this paper proposes a new variable strength cuckoo search algorithm, called VCS. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
Get full text
Get full text
Thesis -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation
Published 2018“…In real-world software testing, the input variables may vary in how strongly they interact, variable strength combinatorial interaction testing (VS-CIT) can exploit this for higher effectiveness. …”
Get full text
Get full text
Get full text
Book Chapter -
7
Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing
Published 2025“…The effectiveness of these algorithms, also called metaheuristics, largely depends on the capabilities of their search techniques. …”
Get full text
Get full text
Article -
8
A variable combinatorial test suite strategy based on modified greedy algorithm
Published 2015“…A variable strength interaction is the interaction between some of software features which have higher priority than the interaction between the others software features. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation
Published 2018“…This study presented the most recent variable interaction strength (VS) CT strategy using an enhanced variant in the greedy algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Short-term electricity price forecasting in deregulated electricity market based on enhanced artificial intelligence techniques / Alireza Pourdaryaei
Published 2020“…The proposed feature selection technique comprises of Multi-objective Binary-valued Backtracking Search Algorithm (MOBBSA). It is used to search within a number of input variables combinations and to select the feature subsets, which minimizes simultaneously vice-versa the estimation error and the feature numbers. …”
Get full text
Get full text
Get full text
Thesis -
13
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
14
Harmony search-based robust optimal controller with prior defined structure
Published 2013“…In this approach, a combination of interacting two levels HS optimization algorithm is presented. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Development of genetic algorithm for optimization of yield models in oil palm production
Published 2018“…Owing to this great interest in the predictions, the study aims to develop a genetic algorithm (GA) to identify the relevant variables and search for the best combinations for modelling to examine the potential of oil palm production in Sarawak and Sabah, Borneo, Malaysia, under a given set of assumptions. …”
Get full text
Get full text
Get full text
Article -
18
Development of two matheuristics for production-inventory-distribution routing problem / Dicky Lim Teik Kyee
Published 2018“…Both algorithms are tested on a set of 90 benchmark instances with 50, 100 and 200 customers and 20 periods and the results are competitive when compared to the Memetic Algorithm with Population Management (MA|PM), Reactive Tabu Search (RTS) and Scatter Search (SS). …”
Get full text
Get full text
Get full text
Thesis -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
20
Coronary artery stenosis detection and visualization / Tang Sze Ling
Published 2015“…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
Get full text
Get full text
Thesis
