Search Results - (( developing building parallel algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- building parallel »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Parallel Implementation Of Field Visualizations With High Order Tetrahedral Finite Elements
Published 2013“…The results show that computational times taken in the data post-processing significantly decreases when multicore parallel processing is enabled. The developed algorithm was assessed on various problem geometries with considerable high number of unknowns where it is found that the approach is quite scalable.…”
Get full text
Get full text
Thesis -
8
Parallel processing in Compute Unified Device Architecture (CUDA) for energy saving glass
Published 2014“…One way to allow more useful signals to go through the glass is by using complex shape coating structure. In order to develop a complex coating structure, genetic algorithm technique is used in this research. …”
Get full text
Get full text
Article -
9
Customised fitness function of evolutionary algorithm for optimization of car park space / Ahmad Syahir Ab. Aziz
Published 2017“…Genetic algorithm is chosen for the development of the prototype to prove that genetic algorithm is the best technique to implement for optimization. …”
Get full text
Get full text
Thesis -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…Researchers were developed this method for the protection of this algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
-
14
Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection
Published 2019“…The FBTS integrated with automated edge-preserving regularization algorithm is implemented in C++ programming language executed in parallel computing. …”
Get full text
Get full text
Thesis -
15
High efficiency RF power amplifier with closed loop system for public safety radio communications / Lokesh Anand Vijayakumaran
Published 2019“…Firstly, a parallel-combined impedance matching technique is introduced where it enables the designers to develop broadband PA with actual PA device impedance. …”
Get full text
Get full text
Get full text
Thesis -
16
On line fault detection for transmission line using power system stabilizer signals
Published 2007“…Hence, this study will show that not only the PSS able to compensate the damping due to the disturbance but also by using the developed algorithm it succeeds to detect and classify the fault conditions on the parallel transmission lines.…”
Get full text
Get full text
Thesis -
17
Cryptographic protection of block-oriented storage devices using AES-XTS in FPGA
Published 2013“…In addition AES-XTS decryption modules were also designed. Also the parallel AES-XTS encryption and decryption design were used to develop integrated chip of AES-XTS on FPGA. …”
Get full text
Get full text
Thesis -
18
Fluid-solid conjugate heat transfer modelling using weakly compressible smoothed particle hydrodynamics
Published 2019“…On the modelling of non-isothermal hydrodynamically fully-developed channel flow, the Dirichlet inlet temperature boundary condition was implemented without having to build a separate temperature reset zone as proposed in the open literature. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
Efficient reconfigurable architectures for 3-D medical image compression
Published 2010“…These have provided an impetus to the development of other applications, in particular telemedicine and teleradiology. …”
Get full text
Get full text
Thesis
