Search Results - (( based construction tree algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- based construction »
- construction tree »
- testing algorithm »
- java application »
- tree algorithm »
-
1
A Data Mining Approach to Construct Graduates Employability Model in Malaysia
Published 2024Get full text
Article -
2
A data mining approach to construct graduates employability model in Malaysia
Published 2011“…The performance of Bayes algorithms are also compared against a number of tree-based algorithms. …”
Get full text
Get full text
Get full text
Article -
3
An extended ID3 decision tree algorithm for spatial data
Published 2011“…The objective of this paper is to propose a new spatial decision tree algorithm based on the ID3 algorithm for discrete features represented in points, lines and polygons. …”
Get full text
Get full text
Conference or Workshop Item -
4
-
5
Constructing routing tree for centralized scheduling using multi-channel single transceiver system in 802.16 mesh mode
Published 2008“…This paper proposes a centralized scheduling algorithm that can reduce interferences by constructing routing tree with multi-channel single transceiver system in WiMAX mesh networks. …”
Get full text
Get full text
Conference or Workshop Item -
6
A frequent pattern mining algorithm based on FP-growth without generating tree
Published 2010“…It then divides the compressed database into a set of conditional databases (a special kind of projected database), each associated with one frequent item or pattern fragment, and mines each such database separately.For a large database, constructing a large tree in the memory is a time consuming task and increase the time of execution.In this paper we introduce an algorithm to generate frequent patterns without generating a tree and therefore improve the time complexity and memory complexity as well.Our algorithm works based on prime factorization, and is called Frequent Pattern- Prime Factorization (FPPF).…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
8
-
9
A frequent pattern mining algorithm based on FP-growth without generating tree
Published 2010“…Our algorithm works based on prime factorization, and is called Frequent Pattern-Prime Factorization (FPPF).…”
Get full text
Get full text
Conference or Workshop Item -
10
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…Empirical result demonstrates that the proposed algorithm can be used to join two spatial objects in constructing a spatial decision tree from a spatial dataset. …”
Get full text
Get full text
Get full text
Article -
11
Genetic algorithms for VLSI micro-Cell layout area optimization based on binary tree
Published 2009Get full text
Working Paper -
12
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second and third scenarios evaluate the performance of Coalition-Based Index-Tree by examining the effects of Dynamic-Coalition framework and Static-Coalition algorithm on Coalition-Based Index-Tree framework. …”
Get full text
Get full text
Get full text
Thesis -
13
The stopping rules for winsorized tree
Published 2017“…Winsorized tree is a modified tree-based classifier that is able to investigate and to handle all outliers in all nodes along the process of constructing the tree.It overcomes the tedious process of constructing a classical tree where the splitting of branches and pruning go concurrently so that the constructed tree would not grow bushy. …”
Get full text
Get full text
Conference or Workshop Item -
14
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…It is separated into three phases: 1) construction of multicast tree. 2) Handoff process. 3) Optimization Process. …”
Get full text
Get full text
Thesis -
15
Constructing routing tree centralized scheduling using multi-channel system in 802.16
Published 2008“…This paper proposes a centralized scheduling algorithm by constructing routing tree in WiMax mesh network, which introduces the cross-layer concept between the media access controller (MAC) and the network layers. …”
Get full text
Get full text
Conference or Workshop Item -
16
Prime-based method for interactive mining of frequent patterns
Published 2010“…The PC-tree is a well-organized tree structure, which is systematically built based on descendant making introduced in this study. …”
Get full text
Get full text
Thesis -
17
Parsing algorithms for grammars with regulated rewriting
Published 2011“…In this paper, we show that the parsing problem for regulated grammars can be solved by means of Petri net derivation trees constructed using the net unfolding. Moreover, we present a parsing algorithm for the deterministic restriction of Petri net controlled grammars based on the well-known Earley parsing algorithm.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
A novel steganography algorithm using edge detection and MPC algorithm
Published 2019“…Next, a full tree is constructed per group using the LSBs of its pixels. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
A proactive energy awareness traffic routing for wireless sensor networks against energy sink-holes
Published 2019“…In this thesis, cooperative communication based on tree topology construction is proposed to address energy and routing decision challenges in WSNs with single and multiple sinks. …”
Get full text
Get full text
Thesis -
20
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal
