Search Results - (( developing block system algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- developing block »
- system algorithm »
- java application »
- mining algorithm »
- block system »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A new 128-bit block cipher
Published 2009“…Even though there have been so much development of the block cipher, the industry still requires another block cipher as long as security features are met. …”
Get full text
Get full text
Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Maze Mouse
Published 2004“…The first block is the sensory systems which generate the input to the microcontroller systems. …”
Get full text
Get full text
Final Year Project -
9
Development of DNA-based dynamic key-dependent block cipher
Published 2015“…The symmetric block cipher is one of the most significant cryptographic algorithms. …”
Get full text
Get full text
Thesis -
10
Unique class encryption (UCE) substitution boxes (S-Boxes) using mysterious Quranic for block ciphers in ICT security
Published 2010“…The Al-Muqattaat UCE was patent filed in 2007. A block cipher is required as a medium to translate the non - parametric Al-Muqatta’at algorithm into a suite so that it can be an embedded system for FPGA chips. …”
Get full text
Get full text
Proceeding Paper -
11
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
12
Direct Integration Block Method for Solving Higher Order Ordinary Differential Equations
Published 2010“…In this thesis, the implicit block methods presented as in the simple form of Adams Moulton method are developed for solving higher order systems of Ordinary Differential Equations (ODEs). …”
Get full text
Get full text
Thesis -
13
-
14
Parallel block backward differentiation formulas for solving ordinary differential equations.
Published 2008“…A parallel block method based on Backward Differentiation Formulas (BDF) is developed for the parallel solution of stiff Ordinary Differential Equations (ODEs). …”
Get full text
Article -
15
Secure block cipher inspired by the human immune system
Published 2012“…In computer security service, cryptographic algorithm is used to ensure adequate security of the systems or of data transfers. …”
Get full text
Get full text
Thesis -
16
Approximating Non Linear Higher Order ODEs By A Three Point Block Algorithm
Published 2024journal::journal article -
17
-
18
Parallel direct integration variable step block method for solving large system of higher order ordinary differential equations.
Published 2009“…The performance of the developed two point block method designed for two processsors for solving directly non stiff large systems of higher order ordinary differentiall equations (ODEs) has been investigated. …”
Get full text
Get full text
Article -
19
Development of Finite Element Code for Non-Linear Analysis of Interlocking Mortarless Masonry System
Published 2006“…An incremental-iterative 2-D nonlinear finite element code is developed to implement the proposed algorithm and analyze the masonry system till failure. …”
Get full text
Get full text
Thesis -
20
