Search Results - (( code application among algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- application among »
- code application »
- java application »
- application tree »
- among algorithm »
- tree algorithm »
-
1
-
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
4
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. The general idea of I-PrefixSpan is to use the efficient data structure for general tree-like framework and separator database to reduce the execution time and memory usage. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
-
8
AI powered asthma prediction towards treatment formulation: an android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
9
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Hashed Message Authentication Code (HMAC) is widely used to provide authenticity, while symmetric encryption algorithms provide confidentiality. …”
Get full text
Get full text
Thesis -
10
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph -
11
-
12
A Comparison Study of LDPC and BCH Codes
Published 2006Get full text
Get full text
Final Year Project -
13
AI powered asthma prediction towards treatment formulation : An android app approach
Published 2022“…We utilized eight robust machine learning algorithms to analyze this dataset. We found that the Decision tree classifier had the best performance, out of the eight algorithms, with an accuracy of 87%. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007Get full text
Get full text
Conference or Workshop Item -
16
Computational simulation for static and dynamic load of rectangular plate in elastic region for analysis of impact resilient structure.
Published 2012“…Further simulations are carried out using commercial codes for some sample applications to explore impact resilient structural characteristics in the elastic region.…”
Get full text
Get full text
Conference or Workshop Item -
17
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
18
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Handheld devices 3D video streaming compression algorithm / Mohamad Taib Miskon, Hamidah Jantan and Wan Ahmad Khusairi Wan Chek
Published 2016“…In recent years, a Three Dimensional Discrete Cosine Transform (3D-DCT) coding algorithm has been developed for compression of still 3D integral images [8-10], The main benefit of using transform coding is that integral 3D images are inherently divided into small non-overlapping…”
Get full text
Get full text
Research Reports -
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
Get full text
Get full text
Thesis
