Search Results - (( java application mining algorithm ) OR ( based e learning algorithm ))
Search alternatives:
- application mining »
- learning algorithm »
- java application »
- mining algorithm »
- e learning »
- based e »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
E4ML: Educational Tool for Machine Learning
Published 2003Get full text
Get full text
Conference or Workshop Item -
8
An adaptive HMM based approach for improving e-Learning methods
Published 2023“…Maladaptive e-Learning systems cannot impart quality content for each student as the users observe the information based on their exclusive learning traits. …”
Conference Paper -
9
Modeling time series data using Genetic Algorithm based on Backpropagation Neural network
Published 2018“…Based on the results obtained, a better prediction result can be produced by the proposed GA-BPNN learning algorithm.…”
Get full text
Get full text
Thesis -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
A conceptual multi-agent framework using ant colony optimization and fuzzy algorithms for learning style detection
Published 2023Subjects: “…e-Learning…”
Conference Paper -
12
Algorithm animation for cryptanalysis of caesar and hill ciphers / Sapiee Haji Jamel and Giuseppina Sherry Sayan
Published 2009“…This new trend gives an advantage to cryptanalyst since types of algorithm(s) used are no longer a secret. Cryptanalysis steps can be easily explained using algorithm animation that can be easily integrated with any e-learning platform. …”
Get full text
Get full text
Get full text
Article -
13
PMT : opposition based learning technique for enhancing metaheuristic algorithms performance
Published 2020“…Nevertheless, many metaheuristic algorithms are still suffering from a low convergence rate because of the poor balance between exploration (i.e. roaming new potential search areas) and exploitation (i.e., exploiting the existing neighbors). …”
Get full text
Get full text
Thesis -
14
A network aware based recommender system for VOIP application service in eLearning environment / Nazdiana Ab. Wahab
Published 2009“…This paper showed the integration of VOIP in a simple eLearning prototype system. A network aware based algorithm is used to recommend users the best VOIP services available at that point of time (whether audio, video or data) based on the real time data obtained from bandwidth measurement tool. …”
Get full text
Get full text
Thesis -
15
-
16
A new SMS spam detection method using both Content-Based and non Content-Based features
Published 2024Subjects:Conference Paper -
17
Lexicon-based and immune system based learning methods in Twitter sentiment analysis
Published 2016“…The aim of this article attempts to study the potential of this method in text classification for sentiment analysis.This study consists of three phases; data preparation; classification model development using three selected Immune System based algorithms i.e. Negative Selection algorithm (NSA), Clonal Selection algorithm (CSA) and Immune Network algorithm (INA); and model analysis. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
E-history Malaysian secondary school textbook using TF-IDF algorithm and text visualization / Nur Hafizah Mohd Ridzuan
Published 2020“…The objective of the project is to design and develop an E-History Malaysian secondary school textbook system using Term Frequency-Inverse Document Frequency (TF-IDF) algorithm with text visualization and also to test the functionality and usability of the system through a web-based system. …”
Get full text
Get full text
Thesis -
19
Reinforcement Learning Algorithm for Optimising Durian Irrigation Systems: Maximising Growth and Water Efficiency
Published 2024“…This study presents a Reinforcement Learning-based algorithm designed to optimise irrigation for Durio Zibethinus (i.e., durian) trees, aiming to maximise tree growth and reduce water usage. …”
Get full text
Get full text
Get full text
Article -
20
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Conference paper
