Search Results - (( java application mining algorithm ) OR ( java communication a algorithm ))
Search alternatives:
- application mining »
- java communication »
- java application »
- mining algorithm »
- communication a »
- a algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…Currently, normal SMS using GSM communication is not secured and safe enough. One of the solutions is to have a security application implemented in mobile phone device. …”
Get full text
Get full text
Conference or Workshop Item -
10
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
Network game (Literati) / Chung Mei Kuen
Published 2003“…With the powerful networking features of Java applet, it is expected that this project would produce a real game engine. …”
Get full text
Get full text
Thesis -
13
EasyA: Easy and effective way to generate pairwise test data
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A survey of energy-aware real time scheduling tools
Published 2015Get full text
Get full text
Conference or Workshop Item -
15
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…Advanced Encryption Standard algorithm is being used to encrypt the text messaging. …”
Get full text
Get full text
Student Project -
16
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
Get full text
Get full text
Get full text
Thesis -
17
Visdom: Smart guide robot for visually impaired people
Published 2025“…Key features include the SMAC Hybrid A* algorithm for global path planning, the Regulated Pure Pursuit Controller for local trajectory execution and dynamic obstacle avoidance, and gmapping for SLAM functionality. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Text messaging encryption system
Published 2012“…Text Messaging Encryption system is a text message encryption and decryption.Encryption is a process of masking a message so that it is unreadable.Encryption is important to avoid other people to read certain information. …”
Get full text
Get full text
Undergraduates Project Papers -
19
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
Get full text
Get full text
Thesis -
20
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper
