Search Results - (( database application based algorithm ) OR ( java application tree algorithm ))
Search alternatives:
- database application »
- application based »
- java application »
- application tree »
- tree algorithm »
-
1
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
2
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…In this paper, we propose an improvement of pattern growth-based PrefixSpan algorithm, called I-PrefixSpan. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
5
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
A frequent pattern mining algorithm based on FP-growth without generating tree
Published 2010Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
9
Efficient skyline processing algorithm over dynamic and incomplete database
Published 2018Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
-
11
Algorithm of face recognition by principal component analysis
Published 2002“…A face recognition algorithm based on Principal Component Analysis (PCA) has been developed and tested for computer vision applications. …”
Get full text
Get full text
Article -
12
A filtering algorithm for efficient retrieving of DNA sequence
Published 2009“…The algorithm filtered the expected irrelevant DNA sequences in database from being computed for dynamic programming based optimal alignment process. …”
Get full text
Get full text
Get full text
Article -
13
Text searching algorithm using boyer moore horspool (BMH) algorithm
Published 2015“…The objective of this study is to develop a searching function using Boyer-Moore Horspool algorithm based on keyword in a medical database. Therefore, we intend to provide an automatic search routine in the medical first aid application and evaluate performance of the proposed searching algorithm through character match percentage. …”
Get full text
Get full text
Undergraduates Project Papers -
14
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016Get full text
Get full text
Conference or Workshop Item -
15
-
16
Iris localisation using Fuzzy Centre Detection (FCD) scheme and active contour snake
Published 2014“…Based on the experimental result, the proposed method shows promising results for both types of databases, including comparison with the some existing iris localisation algorithm.…”
Get full text
Get full text
Get full text
Article -
17
A state of the art comparison of databases for facial occlusion
Published 2015“…These databases are customized for a particular need of one algorithm. …”
Get full text
Get full text
Article -
18
Facial image retrieval on semantic features using adaptive mean genetic algorithm
Published 2019“…Retrieval can either be content or text-based. In this paper, the focus is on the content-based image retrieval from the FGNET database. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…The chaotic-based encryption algorithms have been improved a lot in terms of their robustness. …”
Get full text
Get full text
Get full text
Article -
20
Wi-Fi signals database construction using chebyshev wavelets for indoor positioning systems
Published 2019“…Some of the most common applications include location-based advertising, directory assistance, point-to-point navigation, asset tracking, emergency and fleet management. …”
Get full text
Get full text
Article
