Search Results - (( based information efficient algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Efficient Entropy-Based Decoding Algorithms For Higher-Order Hidden Markov Model by Chan, Chin Tiong

    Published 2019
    “…This algorithm is a memory-efficient algorithm due to its required memory space that is time independent. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Design of information hiding algorithm for multi-link network transmission channel by Fu, Songyin, Wang, Rangding

    Published 2019
    “…The average time spent on hiding information is 2.04 s, indicating that the algorithm has high information hiding rate and storage efficiency.…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Energy Efficient Technique for Cluster Head Selection and Data gathering in Wireless Sensor Network by Asfandyar, khan, Imran, M., Azween, Abdullah

    Published 2008
    “…All nodes after the first round send energy level and distance information from the base station (BS) to the cluster-head. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Efficient Big Integer Multiplication and Squaring Algorithms for Cryptographic Applications by Jahani, Shahram, Samsudin, Azman, Subramanian, Kumbakonam Govindarajan

    Published 2014
    “…In this paper, we introduce new symbols extracted from binary representation of integers called Big-ones.We present a modified version of the classicalmultiplication and squaring algorithms based on the Big-ones to improve the efficiency of big integermultiplication and squaring in number theory based cryptosystems. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    An Improved Genetic Clustering Algorithm for Categorical Data by Jasni, Mohamad Zain, Qin, Hongwu, Ma, Xiuqin, Herawan, Tutut

    Published 2013
    “….: G-ANMI: A mutual information based genetic clustering algorithm for categorical data, Knowledge-Based Systems 23, 144–149(2010)] proposed a mutual information based genetic clustering algorithm named G-ANMI for categorical data. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  14. 14

    An enhanced color image encryption algorithm using LT-PRNG by Mohammed Ismael, Saba

    Published 2018
    “…For future studies, the proposed encryption algorithm can be enhanced by combined compression encryption techniques, which would increase the encryption efficiency. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Healthcare Data Analysis Using Water Wave Optimization-Based Diagnostic Model by Kaur, Arvinder, Kumar, Yugal

    Published 2021
    “…It was observed that the WWO algorithm suffered from the absence of global best information and premature convergence problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    Incorporating stemming algorithm in the Malay information retrieval that employs Thesaurus aproach / Mohd Rosmadi Mokhtar by Mokhtar, Mohd Rosmadi

    Published 2001
    “…Advance in information technology has made it possible for a wide range of text-based information to be search and retrieved online, locally or from remote hosts. …”
    Get full text
    Get full text
    Thesis
  20. 20

    An efficient fuzzy clustering algorithm for mining user session clusters on web log data by Mallik, M. A., Zulkurnain, Nurul Fariza

    Published 2021
    “…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article