Search Results - (( java application mining algorithm ) OR ( data implementation level algorithm ))
Search alternatives:
- implementation level »
- data implementation »
- application mining »
- java application »
- mining algorithm »
- level algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Implementation of High Speed Large Integer Multiplication Algorithm on Contemporary Architecture
Published 2018“…We are able to eliminate the bottleneck, the CRT algorithm from our previous implementation by replacing it with another level of CTFNT and hence increased the multiplication operand size to 4096, 192K, 384K and 768K-bit.In our FPGA implementation, we focused on designing the processing unit ourselves that is capable of computing 3072-bit multiplication. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Parallel Implementation of Two Level Barotropic Models Applied to the Weather Prediction Problem
Published 2004“…Then, the system of equations is solved using Gauss Seidel method. To process the data collected from British Atmospheric Data Centre (BADC), the sequential programs in row and columnwise fashions are developed and implemented. …”
Get full text
Get full text
Thesis -
11
Implementation of perez-dumortier calibration algorithm
Published 2014“…To avoid the unnecessary needs to travel to high altitude for sunphotometers calibration, Perez-Dumotier calibration algorithm has been used as an objective means to select the right intensity data so that the calibration can be performed at any altitude levels. …”
Get full text
Get full text
Get full text
Chapter In Book -
12
Randomness Tests On Nine Data Categories Of RECTANGLE Using NIST Statistical Test Suite
Published 2024Article -
13
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…It does not simply fit data to a chart to visualize an algorithm, there is no main data set. …”
Get full text
Get full text
Get full text
Article -
14
ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS
Published 2013“…In this work, by using the recent robust deconvolution algorithm of Pimonov et al. and/or the ones implemented in Weatherford PanSystem Well Test Software, the effects of the algorithmic parameters (including error levels in pressure and rate data, and the curvature constraint value) as well as the initial pressure on the deconvolved responses are investigated. …”
Get full text
Get full text
Final Year Project -
15
Cyber Threat Extenuation for Substation Data Communication: Evaluation of Encrypt-Authenticator Prototype for IEC 60870-5 Data
Published 2023Conference Paper -
16
Jogging activity recognition using k-NN algorithm
Published 2022“…The k-NN algorithm is a simple and easy-to-implement supervised machine learning algorithm that can be used to solve both classification and regression problems. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
18
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
19
Implementation of generalized predictive control (GPC) for a real-time process control using labview
Published 2006“…In this research, a predictive algorithm namely Generalized Predictive Control will be evaluated in real-time by applying LabVIEW software as tools for algorithm implementation. …”
Get full text
Get full text
Thesis -
20
Implementation of Station-To-Station (STS) protocol using Elliptic Curve Digital Signature Al Algorithm / Muhammad Faris Fakhri Rozi, Alya Syuhada Ismail and Emylia Suhaimi
Published 2018“…It was believed that this implementation has increased the level of secrecy in the sharing session using the method applied. …”
Get full text
Get full text
Student Project
