Search Results - (( based method mining algorithm ) OR ( java implementation _ algorithm ))
Search alternatives:
- java implementation »
- mining algorithm »
- method mining »
- based method »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Tree-based contrast subspace mining method
Published 2020“…The research works involve first preparing the real world numerical and categorical data sets. Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
4
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011“…In this paper, we propose a new method based on prime number and its characteristics mainly for interactive mining of frequent patterns. …”
Get full text
Get full text
Article -
5
Prime-based method for interactive mining of frequent patterns
Published 2010“…Then, the proposed method is developed based on the architecture such that the mining model is constructed once, and it can be frequently mined by various minsup. …”
Get full text
Get full text
Thesis -
6
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
A numerical method for frequent pattern mining
Published 2009“…In this paper, an efficient numerical method for mining frequent patterns is proposed. This method is based on prime number characteristics to generate all frequent patterns by using maximal frequent ones. …”
Get full text
Get full text
Article -
8
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
9
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
10
Optimizing Tree-Based Contrast Subspace Mining Using Genetic Algorithm
Published 2022“…Recently, tree-based contrast subspace mining method has been introduced to find contrast subspace in numerical data set effectively. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
11
Case Slicing Technique for Feature Selection
Published 2004“…CST was compared to other selected classification methods based on feature subset selection such as Induction of Decision Tree Algorithm (ID3), Base Learning Algorithm K-Nearest Nighbour Algorithm (k-NN) and NaYve Bay~sA lgorithm (NB). …”
Get full text
Get full text
Thesis -
12
Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.]
Published 2024“…The proposed method is based on comparing two algorithms: Apriori and Frequent Pattern Growth (FP- Growth). …”
Get full text
Get full text
Article -
13
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
14
A Rough-Apriori Technique in Mining Linguistic Association Rules
Published 2008“…It uses the rough membership function to capture the linguistic interval before implementing the Apriori algorithm to mine interesting association rules. The performance of conventional quantitative association rules mining algorithm with Boolean reasoning as the discretization method was compared to the proposed technique and the fuzzy-based technique. …”
Get full text
Get full text
Get full text
Book Chapter -
15
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
16
-
17
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
18
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…However, less works have been conducted in applying multiobjective based algorithm for topic extraction. Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
A frequent pattern mining algorithm based on FP-growth without generating tree
Published 2010“…Our algorithm works based on prime factorization, and is called Frequent Pattern-Prime Factorization (FPPF).…”
Get full text
Get full text
Conference or Workshop Item -
20
A frequent pattern mining algorithm based on FP-growth without generating tree
Published 2010“…It then divides the compressed database into a set of conditional databases (a special kind of projected database), each associated with one frequent item or pattern fragment, and mines each such database separately.For a large database, constructing a large tree in the memory is a time consuming task and increase the time of execution.In this paper we introduce an algorithm to generate frequent patterns without generating a tree and therefore improve the time complexity and memory complexity as well.Our algorithm works based on prime factorization, and is called Frequent Pattern- Prime Factorization (FPPF).…”
Get full text
Get full text
Get full text
Conference or Workshop Item
