Search Results - (( java application mining algorithm ) OR ( data implementation based algorithm ))
Search alternatives:
- implementation based »
- data implementation »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…The purpose of this project is to implement FPGA Base Encryption Chip using DES algorithm. …”
Get full text
Get full text
Monograph -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
-
10
Liquid slosh suppression by implementing data-driven fractional order pid controller based on marine predators algorithm
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Enhancing Classification Algorithms with Metaheuristic Technique
Published 2024“…Classification is a process of grouping or placing data into appropriate categories or classes based on specificattributes or features to predict labels or classes of new data based on patternsobserved from previously trained data. …”
Get full text
Get full text
Get full text
Article -
13
Comparative Analysis of Neighborhood based Meta-heuristic Algorithms for MC/DC Test Data Generation
Published 2016Get full text
Get full text
Conference or Workshop Item -
14
Liquid slosh suppression by implementing data-driven fractional order PID controller based on marine predators algorithm
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Parallelization of noise reduction algorithm for seismic data on a beowulf cluster
Published 2010“…This paper presents the parallelization of a sequential noise reduction algorithm for seismic data processing into a parallel algorithm. …”
Get full text
Get full text
Citation Index Journal -
16
FPGA implementation of CPFSK modulation techniques for HF data communication
Published 2003“…Digital modulation based on FSK is widely used in HF data communication. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
A study of fluctuations in genetic algorithm optimized network in data centre
Published 2017“…The reliability of genetic algorithm may vary based on implementation case, hence it is necessary to investigate its performance pattern for each implementation case. …”
Get full text
Get full text
Article -
18
Conceptual framework for lightweight ciphertext policy-attribute based encryption scheme for internet of things devices / Norhidayah Muhammad and Jasni Mohamad Zain
Published 2019“…Therefore we propose a lightweight Ciphertext Policy-Attribute Based Encryption (CP-ABE) algorithm to implement in IoT devices. …”
Get full text
Get full text
Get full text
Article -
19
FPGA Implementation of RSA Public-Key Cryptographic Coprocessor
Published 2000“…The hardware implementation of the RSA algorithm for public-key cryptography is presented. …”
Get full text
Get full text
Article -
20
A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre
Published 2018“…The reliability of genetic algorithm may vary based on implementation case, hence it is necessary to investigate its performance pattern for each implementation case. …”
Get full text
Get full text
Article
