Search Results - (( data integration mining algorithm ) OR ( java implementation _ algorithm ))
Search alternatives:
- java implementation »
- integration mining »
- data integration »
- mining algorithm »
-
1
Feature selection with integrated Gaussian seahorse optimization data mining for cross-border business cooperation between the Malaysian medical industry and tourism industry
Published 2023“…This study proposes an integrated approach that combines feature selection with Gaussian Seahorse Optimization Data Mining (GSH-DM) to identify the most relevant features and optimize the data mining process. …”
Get full text
Get full text
Get full text
Article -
2
Discovering association rules for mining images datasets: a proposal
Published 2005Get full text
Get full text
Conference or Workshop Item -
3
Rough-Set-and-Genetic-Algorithm based data mining and Rule Quality Measure to hypothesize distance protective relay operation characteristics from relay event report
Published 2011“…Firstly, the data mining approach of the integrated-Rough-Set-and-Genetic-Algorithm is used to discover the relay CD-decision algorithm. …”
Get full text
Get full text
Article -
4
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…Every context requires its own customized text mining algorithms in order to achieve best results. …”
Get full text
Get full text
Thesis -
6
Setting up a new Radiology Center Technology for improvement : Data mining (Image Mining Technique)
Published 2016“…Data mining is the process of mining the hidden patterns from the huge data. …”
Get full text
Get full text
Monograph -
7
Integrated approach using data mining-based decision tree and object-based image analysis for high-resolution urban mapping of WorldView-2 satellite sensor data
Published 2016“…This paper integrates decision tree–based data mining (DM) and object-based image analysis (OBIA) to provide a transferable model for the detailed characterization of urban land-cover classes using WorldView-2 (WV-2) satellite images. …”
Get full text
Get full text
Get full text
Article -
8
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Sequential pattern mining is a new branch of data, mining science that solves inter-transaction pattern mining problems. …”
Get full text
Thesis -
9
Modeling Teacher's Integrity Using Data Mining
Published 2010“…Researcher indicated there are many factors can affect teacher's integrity. Thus, the aim of this study is to develop a model for teacher's integrity using data mining technique. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Sequential pattern mining is a new branch of data, mining science that solves inter-transaction pattern mining problems. …”
Get full text
Get full text
Thesis -
12
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
13
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
14
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
15
-
16
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
17
Sequential pattern mining using PrefixSpan with pseudoprojection and separator database
Published 2008“…Sequential pattern mining is a new branch of data mining science that solves inter-transaction pattern mining problems. …”
Get full text
Get full text
Conference or Workshop Item -
18
Framework for mining XML format business process log data
Published 2024“…The Flatten Sequential Structure Model (FSSM) was developed to transform tree-structured data into structured, preserving its structural integrity, thus facilitating comprehensive statistical analysis and data mining. …”
Get full text
Get full text
Thesis -
19
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
20
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book
