Search Results - (( code data visualization algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- data visualization »
- application mining »
- java application »
- mining algorithm »
- code data »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Optimization of the Jakim halal logo placement on qr code using enhanced genetic algorithm
Published 2018“…The thesis proposed a method to place a logo on top of the QR code, embedded with high data capacity, using Genetic Algorithm (GA) search technique to find appropriate size and location so the QR code can be decoded by various QR code decoders. …”
Get full text
Get full text
Get full text
Thesis -
4
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Current work adopts the Fuzzy c-means Bag of Visual Words model and sparse coding for plant identification. …”
Get full text
Get full text
Get full text
Article -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…This contributes to the creation large amount of data or information such as big data. Big data is a phrase for huge data sets having large, more variety and complicated element with the challenges of storing, analyzing and visualizing for further actions and obtaining the results. …”
Get full text
Get full text
Thesis -
7
Efficient selective encryption schemes to secure video data and moving objects information for HEVC/H.265 using advanced encryption standard / Mohammed Ahmed Mohammed Saleh
Published 2016“…In the first and second methods, the visual video information is secured by encrypting limited transformed coefficients using AES algorithm. …”
Get full text
Get full text
Thesis -
8
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…In three dimensional simulations, post-processing poses considerable challenge since available data visualization software programs do not accommodate such a high order visualization—common data visualizers can only visualize for up to ten-node tetrahedron elements. …”
Get full text
Get full text
Thesis -
11
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
12
Detection of head position using chain code algorithm
Published 2007“…The main contribution of this thesis is it contributes an algorithm of head recognition and detecting which based on image segmentation, Prewitt edge detection and Chain Code algorithm. …”
Get full text
Get full text
Thesis -
13
Challenges in multi-layer data security for video steganography
Published 2018“…The cryptography algorithms add one layer of security on steganography algorithms and error correction codes improves the robustness of steganography algorithms. …”
Get full text
Get full text
Get full text
Article -
14
The evolution and trend of chain code scheme
Published 2008“…This algorithm is able to visualize and to transcribe a binary image into vertex chain code easily. …”
Get full text
Get full text
Get full text
Article -
15
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
16
Algorithm visualization design guidelines for mobile leaning
Published 2018“…This study is about the algorithm visualization design guidelines for mobile platform, to teach students data structures and algorithm (DSA) subject effectively. …”
Get full text
Get full text
Get full text
Article -
17
Enhanced Flipping Technique to Reduce Variability in Image Steganography
Published 2023“…Benchmarking; Discrete cosine transforms; Genetic algorithms; Image coding; Image enhancement; Mean square error; Signal to noise ratio; Bayes method; Cover-image; Data hidden; Embedding capacity; Flipping methods; Least significant bits; Medium; Optimisations; Variability; Visual qualities; Steganography…”
Article -
18
Enhancing secure QR code steganography through artificial intelligence: a conceptual framework
Published 2025“…It is imperative to employ resilient QR code algorithms to guarantee the security of QR code applications in response to this challenge. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis
