Search Results - (( java application mining algorithm ) OR ( data implementation during algorithm ))
Search alternatives:
- implementation during »
- data implementation »
- application mining »
- java application »
- mining algorithm »
- during algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Festive season balancing groceries optimization / Fairuz Mohamed Razi
Published 2012“…The most important part is during system design and implementation. In this phase, method use in Genetic Algorithm to optimize the system prototype is Rastrigin's function to calculate the fitness of the chromosomes.…”
Get full text
Get full text
Thesis -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
A study of fluctuations in genetic algorithm optimized network in data centre
Published 2017“…Study of fluctuation in genetic algorithm has been a sub-objective in genetic algorithm implementations. …”
Get full text
Get full text
Article -
10
A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre
Published 2018“…Study of fluctuation in genetic algorithm has been a sub-objective in genetic algorithm implementations. …”
Get full text
Get full text
Article -
11
A study of fluctuations and confidence of implementation in genetic algorithm optimized network in data centre
Published 2018“…Study of fluctuation in genetic algorithm has been a sub-objective in genetic algorithm implementations. …”
Get full text
Get full text
Article -
12
-
13
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…Moreover, algorithm visualization systems are also useful tools in algorithm engineering, particularly at several stages during the design, implementation, analysis, tuning, experimental evaluation, and presentation of the algorithms process. …”
Get full text
Get full text
Get full text
Article -
14
COVID-19 DATA EXPLORATION USING MAPPER ALGORITHM
Published 2023“…Application of mapper algorithm through Kepler Mapper, a python implementation of mapper is done to construct mapper graphs for state wise COVID�19 data in Malaysia along year 2021. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
15
CHAOS BASED BLOCK ENCRYPTOR
Published 2008“…This project is basically a block encryption to protect block of data. In this project we will propose encryption algorithm which offer less computational complexity and also provide securing data not only during transmission but also during storage. …”
Get full text
Get full text
Final Year Project -
16
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Published 2020“…One of the main concerns involving software implementation of encryption algorithm is the possibility of slower processing when transmitting and receiving data which consequently will encounter low security level during process of encryption for real-time application. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…The obvious problem in this SM is it uses single communication system as there was no contingency plan in transferring the data when the signal strength was weak or failure during data transfer process. …”
Get full text
Get full text
Thesis -
18
Design and implementation of advanced encryption standard using verilog HDL
Published 2022“…One of the main concerns involving software implementation of encryption algorithm is the possibility of slower processing when transmitting and receiving data which consequently will encounter low security level during process of encryption for real-time application. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Traffic management algorithms for LEO satellite networks
Published 2016“…Those two algorithms are combined together due to the strong possibilities of being unable to achieve the optimal results when implemented separately. …”
Get full text
Get full text
Get full text
Thesis -
20
