Search Results - (( basic information data algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- basic information »
- information data »
- java application »
- mining algorithm »
- data algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…There are several techniques to mine association rules from XML data. The basic approach is to map the XML documents to relational data model and to store them in a relational database. …”
Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…This system is achieved using the Genetic Algorithm which is capable of performing information retrieval and learning algorithm. …”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
DESIGN AND IMPLEMENTATION OF RIPEMD-160 ALGORITHM ON RECONFIGURABLE HARDWARE
Published 2019“…Previously, many encryption algorithms have been investigated. The Cryptography Algorithm is used to protect data through encryption that allows sensitive information to be passed through the network safely. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Developing Bus Tracking System that predicts the arrival times of public buses at Universiti Teknologi PETRONAS (UTP) bus stops.
Published 2004“…The combination usage of the algorithm, AVL, GPS and SMS server, the information regarding the time arrival of the transport can easily being retrieve by users. …”
Get full text
Get full text
Final Year Project -
11
Web usage mining for UUM learning care using association rules
Published 2004“…With the powerful of data mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E�Learning portal. …”
Get full text
Get full text
Thesis -
12
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…The enormous of information on the World Wide Web makes it obvious candidate for data mining research. …”
Get full text
Get full text
Get full text
Thesis -
13
CSC562: Information Retrieval and Searching Algorithms / College of Computing, Informatics and Media
Published 2022Get full text
Get full text
Get full text
Teaching Resource -
14
A network based fetal ECG monitoring algorithm
Published 2011“…The hardware part is developed for abdominal Electrocardiography (AECG) data acquisition system. Individual algorithms and customized application software are developed using Visual Basic for both the networking and Fetal Heart Rate (FHR) monitoring systems. …”
Get full text
Get full text
Get full text
Article -
15
DESIGN AND IMPLEMENTATION OF RIPEMD-160 HASH FUNCTION USING VERILOG HDL
Published 2022“…Now, sensitive data can be safely transmitted via the network thanks to the Cryptography Algorithm's usage of encryption to safeguard data. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
16
Butterfly Triple System Algorithm Based on Graph Theory
Published 2022“…In combinatorial design theory, clustering elements into a set of three elements is the heart of classifying data, which has recently received considerable attention in the fields of network algorithms, cryptography, design and analysis of algorithms, statistics, and Information theory. …”
Get full text
Get full text
Get full text
Article -
17
Recognition of isolated elements picture using backpropagation neural network / Melati Sabtu
Published 2005“…The methodology used in the development of this project is basically based on the eight major steps. There are problem assessment, data acquisition, cropping, pre-processing, design, training, testing and documentation. …”
Get full text
Get full text
Thesis -
18
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…Cryptography is the way of storing and transmitting data by convert the information into unreadable cipher for security which only intended sender and receiver only could access. …”
Get full text
Get full text
Thesis -
19
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
20
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The software used for this prototype is Visual Basic6.0. More over, the information retrieval makes the retrieval of document or collection of data in the storage media more efficient, effective, relevant, faster and more reliable than before. …”
Get full text
Get full text
Research Reports
