Search Results - (( java application mining algorithm ) OR ( variable iteration based algorithm ))
Search alternatives:
- application mining »
- variable iteration »
- java application »
- mining algorithm »
- iteration based »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation
Published 2018“…The proposed variant-greedy algorithm employed the elitism mechanism alongside the iteration in order to improve its’ efficiency. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Optimizing the placement of fire department in Kulim using greedy heuristic and simplex method / Muhammad Abu Syah Mohd Suzaly
Published 2023“…Greedy heuristics is a type of optimization algorithm that makes decisions based on locally optimal solutions. …”
Get full text
Get full text
Thesis -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
-
10
Enhanced chaotic image encryption algorithm based on Baker's map
Published 2003“…This paper discusses an alternative chaotic image encryption based on Baker’s map. This enhanced symmetric-key algorithm can support a variable-size image as opposed to the algorithm which is mainly based on Baker’s map that requires only square image for encryption. …”
Get full text
Get full text
Article -
11
FPGA implementation of variable precision Euclid’s GCD algorithm
Published 2017“…Methodology: In this paper, we implement a fast GCD coprocessor based on Euclid's method with variable precisions (32-bit to 1024-bit). …”
Get full text
Get full text
Get full text
Article -
12
Model selection approaches of water quality index data
Published 2016“…Automatic model selection by using algorithm can avoid huge variability in model specification process compared to manual selection.With the employment of algorithm, the right model selected is then also used for forecasting purposes. …”
Get full text
Get full text
Get full text
Article -
13
Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak
Published 2025“…The model employs a two-level structure, where the first level uses standard soft constraints as the objective function to evaluate solution quality, while the second level dynamically adapts to faculty-specific preferences. A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
-
15
On Newton-Raphson formulation and algorithm for displacement based structural dynamics problem with quadratic damping nonlinearity
Published 2017“…Quadratic damping nonlinearity is challenging for displacement based structural dynamics problem as the problem is nonlinear in time derivative of the primitive variable. …”
Get full text
Get full text
Article -
16
-
17
The efficiency of conjugate gradient methods with global convergence / Siti Nur Hafiza Shamsudin
Published 2019“…Therefore, this study is conducted to compare the efficiency of CG methods base on the number of iteration and CPU time. The global convergence result is established using exact line searches. …”
Get full text
Get full text
Thesis -
18
Design of digital circuit structure based on evolutionary algorithm method
Published 2008“…This method is based on randomized search techniques mimicking natural genetic evolution. …”
Get full text
Get full text
Get full text
Article -
19
A new algorithm for normal and large-scale optimization problems: Nomadic People Optimizer
Published 2019“…The algorithm is validated based on 36 unconstrained benchmark functions. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis
