Search Results - (( developing affecting e algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- developing affecting »
- application mining »
- java application »
- mining algorithm »
- affecting e »
- e algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Comprehensive review of the development of the harmony search algorithm and its applications
Published 2019“…First, we describe the HS algorithm and present how its parameters affect algorithm performance. …”
Get full text
Get full text
Get full text
Article -
9
New approach of cryptography algorithm for e- mail applications
Published 2005“…The purpose of this paper is to introduce and demonstrate a new algorithm for Internet and e-mail security. The purposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Conference or Workshop Item -
10
Enhanced artificial bee colony-least squares support vector machines algorithm for time series prediction
Published 2014“…Upon the completion of data collection and data pre processing, the eABC-LSSVM algorithm is designed and developed. …”
Get full text
Get full text
Get full text
Thesis -
11
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…The purpose of this thesis is to introduce and demonstrate a new algorithm for Internet and e-mail security. The proposed algorithm was developed based on the combination of symmetric and asymmetric algorithm whereas the length of the key and digital signature was considered. …”
Get full text
Get full text
Thesis -
12
Machine learning: tasks, modern day applications and challenges
Published 2019“…Over the last decade, we are able to develop algorithms which can produce better accuracies so better decision making can be achieved. …”
Get full text
Get full text
Get full text
Article -
13
-
14
SEDF: a spoofed email detection framework employed by a lightweight web browser plug-in for detecting the spoofed email / Al Ya@Geogiana Buja...[et al.]
Published 2014“…Boyer - Moore algorithm was claimed to be the fastest algorithm among the others. …”
Get full text
Get full text
Research Reports -
15
-
16
Completion time driven hyper-heuristic approach for optimisation of scientific workflow scheduling in cloud environment / Ehab Nabiel Mohammad
Published 2018“…The second stage (i.e. approach development stage) is the development of the proposed CTDHH approach, which includes two main parts, the cost optimisation model of SWFS and the dynamic hyper-heuristic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Embedded Meta evolutionary-firefly algorithm-ANN for multi dg planning in distribution system / Siti Rafidah Abdul Rahim
Published 2019“…In this study, Meta Evolutionary–Firefly Algorithm (EMEFA) was initially developed to expedite the computational time in multi-DG installation with improved accuracy. …”
Get full text
Get full text
Thesis -
18
-
19
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…We modified the classical bootstrapping algorithm by developing a mechanism based on the robust LTS method to detect the correct number of outliers in the each bootstrap sample. …”
Get full text
Get full text
Thesis -
20
