Search Results - (( developing special data algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- developing special »
- application mining »
- java application »
- mining algorithm »
- data algorithm »
- special data »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
DESIGN AND DEVELOPMENT OF ANDROID-BASED LEARNING MEDIA FOR LEARNING ALGORITHM AND DATA STRUCTURE
Published 2021“…This study aims to design learning media algorithms and data structures based on Android. The research method uses a waterfall-type system development life cycle (SDLC). …”
Get full text
Get full text
Get full text
Proceeding -
9
A hybrid database encryption algorithm based on reverse string and dynamic key
Published 2016“…Personal computers has become one of the important part of human life, especially when they using the Internet or any public networks.So, the information or data may still be deliberately or inadvertently leaked out by the insiders or customers.In this paper, we proposing new algorithm to protect any type of data, depending on the substitution techniques, using dynamic key (DK) and reveres string for each character in the text (or field in the file of the database) and each string .A special equation was developed to generate the DK, it’s depend on the length of string, order the character in the string,ASCII code of the character, and string sequence.The proposed algorithm using the reverse string before encryption, also, there are two actions after that, for the purpose of increasing the complexity of the algorithm.The results showed that The developed algorithm was successes to remove any duplicate encryption, for each character and each record even when the text duplicated.…”
Get full text
Get full text
Conference or Workshop Item -
10
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
Get full text
Get full text
Get full text
Thesis -
11
An estimation algorithm for improved maritime obstacle detection
Published 2024“…A specialized ROS node facilitates data fusion by prioritizing ZED2I camera data, enhancing detection accuracy through comparisons with LiDAR data. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Butterfly Triple System Algorithm Based on Graph Theory
Published 2022“…In combinatorial design theory, clustering elements into a set of three elements is the heart of classifying data, which has recently received considerable attention in the fields of network algorithms, cryptography, design and analysis of algorithms, statistics, and Information theory. …”
Get full text
Get full text
Get full text
Article -
13
Extraction of Inherent Frequency Components of Multiway EEG Data Using Two-Stage Neural Canonical Correlation Analysis
Published 2014“…This paper presents an algorithm for extracting underlying frequency components of massive Electroencephalogram (EEG) data. …”
Get full text
Get full text
Get full text
Article -
14
Quantum Particle Swarm Optimization Technique for Load Balancing in Cloud Computing
Published 2013“…Then they are assigned to the machines according to the assignment algorithm for job combinations, which is a special integer partition algorithm. …”
Get full text
Thesis -
15
Data Analysis and Machine Learning Algorithms Evaluation for Bioliq AI-based Predictive Tool
Published 2019Get full text
Get full text
Final Year Project -
16
Iot health monitoring system for self quarantined covid-19 patients
Published 2022“…This study focuses fully on the development of a system of monitoring the health data of Covid-19 patients who undergoing self-quarantine by means of data classification. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Enhanced mechanism to handle missing data of Hadith classifier
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
18
Rule-based filtering algorithm for textual document
Published 2017“…Improper filtration might cause terms that have similar meaning to be removed.Thus, to reduce the high-dimensionality of text, this study proposed a filtering algorithm that is able to filter the important terms from the pre-processed text and applied term weighting scheme to solve synonym problem which will help the selection of relevant term.The proposed filtering algorithm utilizes a keyword library that contained special terms which is developed to ensure that important terms are not eliminated during filtration process.The performance of the proposed filtering algorithm is compared with rough set attribute reduction (RSAR) and information retrieval (IR) approaches.From the experiment, the proposed filtering algorithm has outperformed both RSAR and IR in terms of extracted relevant terms.…”
Get full text
Get full text
Get full text
Article -
19
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Recently, various techniques based on different algorithms have been developed. However, the classification accuracy and computational cost are not satisfied. …”
Get full text
Get full text
Thesis -
20
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…This analysis is done to verify the algorithm of interpolation method and to find the best interpolation method for implement in the developed android application. …”
Get full text
Get full text
Thesis
