Search Results - (( developing information during algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- developing information »
- information during »
- application mining »
- during algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
A simulation software for DNA computing algorithms implementation
Published 2010“…This simulation software capability is unlimited where problem of any size and complexity can be simulated, thus saving cost due to possible errors during the design process. Information regarding the DNA sequence during the computing process as well as the computing output…”
Get full text
Get full text
Get full text
Article -
9
Smile Mask Development of Cryptography Performance of MOLAZ Method (MOLAZ-SM)
Published 2012“…In the end of 2010 the researcher Engineer Moceheb Lazam during his studies at the Masters in the Universiti Utara Malaysia, develop this algorithm in order to keep the encryption and decoding. …”
Get full text
Get full text
Get full text
Thesis -
10
Mobile Map-Based Positioning System Using Segmentation Algorithm (MM-BPS)
Published 2008“…Vaishnavi and Kuechler Methodology has been implemented in various applications and it considered as a general methodology to develop totally new algorithms and create new information according to the accumulated information. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
A New Machine Learning-based Hybrid Intrusion Detection System and Intelligent Routing Algorithm for MPLS Network
Published 2024“…The ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
Article -
13
Fetal R-Wave detection in the ambulatory monitoring of maternal abdominal signal
Published 1995“…An algorithm for the real-time measurement of the fetal and maternal RR intervals from a single-lead abdominal signal has been developed on a low power TMS32010 digital signal processor development system. …”
Get full text
Get full text
Article -
14
A refined differential evolution algorithm for improving the performance of optimization process
Published 2011Get full text
Get full text
Get full text
Conference or Workshop Item -
15
COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM
Published 2023“…The resulting mapper graphs reveal the pandemic’s development progress across time and place during year 2021. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
16
-
17
Ascertaining trust of information transmitted during a disaster
Published 2016“…During a disaster, especially at the beginning, a huge amount of information is being communicated by the victims to the authority/rescuer. …”
Get full text
Get full text
Article -
18
Ascertaining trust of information transmitted during a disaster
Published 2016“…During a disaster, especially at the beginning, a huge amount of information is being communicated by the victims to the authority/rescuer. …”
Get full text
Get full text
Article -
19
Agro-ento bioinformation: towards the edge of reality
Published 2002“…Bioinformation, in brief, comprises biology, information algorithms, information technology, and communication protocols. …”
Get full text
Get full text
Inaugural Lecture -
20
CleverSecure ONLINE System
Published 2008“…The email system used to send the encrypted file to the third party. During the development of COS, the specific methodology used which is Prototyping Process. …”
Get full text
Get full text
Final Year Project
