Search Results - (( java application matching algorithm ) OR ( pattern estimation mining algorithm ))*
Search alternatives:
- application matching »
- pattern estimation »
- estimation mining »
- java application »
- mining algorithm »
-
1
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…The results also indicate that kind of behavior given by EM clustering algorithm has improved the visit-coherence (accuracy) of navigation pattern mining.…”
Get full text
Get full text
Article -
2
-
3
The discovery of Top-K DNA frequent patterns with approximate method / Nittaya Kerdprasop and Kittisak Kerdprasop
Published 2014“…These representatives are subsequently used in the main process of frequent pattern mining. Our designed algorithm had been implemented with the Erlang language, which is the functional programming paradigm with inherent support for pattern matching. …”
Get full text
Get full text
Get full text
Article -
4
Using language-based search in mining large software repositories
Published 2011“…For the purpose of automating the data retrieval from the repository, a parser was written using the Python programming language, and based on the pattern matching algorithm. The retrieved data were later used to estimate the quality of the open source software.…”
Get full text
Get full text
Get full text
Proceeding Paper -
5
Data mining techniques for disease risk prediction model: A systematic literature review
Published 2023Conference Paper -
6
Using language-based search in mining large software repositories
Published 2011“…For the purpose of automating the data retrieval from the repository, a parser was written using the Python programming language, and based on the pattern matching algorithm. The retrieved data were later used to estimate the quality of the open source software.…”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
10
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
