Search Results - (( data exploration techniques algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- exploration techniques »
- application testing »
- testing algorithm »
- data exploration »
- java application »
-
1
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
An expanded square pattern technique in swarm of quadcopters for exploration algorithm
Published 2017“…The exploration algorithm is one of the most important roles in the searching mechanism. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
Budget visualizer using circle packing technique / Nursyahira Zulkeply
Published 2019“…In order to construct this data visualization, the circle packing algorithm is used to visualize these budgets. …”
Get full text
Get full text
Thesis -
6
-
7
Comparison of Statistic Prediction Results in Weka Explorer Interface and Experimenter Environment Interface on Dataset
Published 2019“…With more data collected for analytical purposes. Techniques data mining through Weka Explorer interface and experimental environment interface into determining the prediction and accuracy using different algorithm ratings to know the performance of best. …”
Get full text
Get full text
Get full text
Article -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Clustering Spatial Data Using a Kernel-Based Algorithm
Published 2005“…Therefore, this work comes up with new clustering algorithm using kernel-based methods for effective and efficient data analysis by exploring structures in the data.…”
Get full text
Get full text
Conference or Workshop Item -
10
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
-
14
-
15
An enhanced feed-forward neural networks and a rule-based algorithm for predictive modelling of students' academic performance
Published 2016“…Findings from the comparison show that, the proposed RBA explores students‟ data much better. It can also serve as an alternative algorithm to the use of machine learning techniques in the exploration of students‟ data for prediction purposes.…”
Get full text
Get full text
Thesis -
16
Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms
Published 2018“…Hence, this research has proposed three enhanced frameworks, namely, Optimized Gravitational-based (OGC), Density-Based Particle Swarm Optimization (DPSO), and Variance-based Differential Evolution with an Optional Crossover (VDEO) frameworks for data clustering. In the OGC framework, the exhibited explorative search behavior of the Gravitational Clustering (GC) algorithm has been addressed by (i) eliminating the agent velocity accumulation, and (ii) integrating an initialization method of agents using variance and median to subrogate the exploration process. …”
Get full text
Get full text
Thesis -
17
An enhanced version of black hole algorithm via levy flight for optimization and data lustering problems
Published 2019“…The processes of retrieving useful information from a dataset are an important data mining technique that is commonly applied, known as Data Clustering. …”
Get full text
Get full text
Get full text
Article -
18
-
19
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
20
Exploration of COVID‑19 data in Malaysia through mapper graph
Published 2024“…To keep with the expanding quantity and complexity of data while employing minimal assumptions, a topological data analysis tool known as the Mapper algorithm is used to explore Malaysia’s daily confirmed cases, deaths, and vaccination data from the onset of the pandemic to June 2022 via data visualization and clustering. …”
Get full text
Get full text
Get full text
Get full text
Article
