Search Results - (( java application service algorithm ) OR ( framework implementation mining algorithm ))
Search alternatives:
- framework implementation »
- implementation mining »
- application service »
- service algorithm »
- java application »
- mining algorithm »
-
1
Improved Boosting Algorithms by Pre-Pruning and Associative Rule Mining on Decision Trees for predicting Obstructive Sleep Apnea
Published 2017“…The improved algorithms were implemented in OSA dataset and UCI online databases for comparisons. …”
Get full text
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
-
5
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The discovered decision algorithm and association rule from the Rough-Set based data mining had been compared with and successfully validated by those discovered using the benchmarking Decision-Tree based data mining strategy. …”
Get full text
Get full text
Thesis -
6
Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy
Published 2019“…The experimental results show that the proposed feature selection framework performed better when compared to other state-of-the-art feature selection algorithms. …”
Get full text
Get full text
Get full text
Thesis -
7
-
8
A framework for malware identification based on behavior
Published 2012“…The IF-THEN Prediction Rules which is generated using the data mining technique, ID3 Algorithm is used. In the implementation of malware target classification, Structure Level Rules are utilized to classify malware into possible target class. …”
Get full text
Get full text
Thesis -
9
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…However, frequent pattern mining (FPM) using Apriori-like algorithms and support-confidence framework suffers from the myth of rare item problem in nature. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
11
Improving Extreme Programming Framework With Security Concerns For E-Commerce Applications
Published 2024thesis::doctoral thesis -
12
RAED: Response Analysis of Educational Data for leveraging knowledge dissemination system
Published 2015“…This paper illustrates architecture to handle which latches into the existing framework and its eco-systems. The proposed architecture provides future researchers to validate their algorithm and get the provisioned output for the teaching-learning added for intelligent applications Keywords; Educational Data, Big Data, Data Analytics, Data Mining, Knowledge Discovery…”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
16
The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data
Published 2024“…A comparative study is done to validate the proposed algorithm by implementing the other contemporary algorithms for the same dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Intelligent transmission line fault diagnosis using the Apriori associated rule algorithm under cloud computing environment
Published 2024“…The functions of private cloud computing clusters for power extensive data management and analysis are realised through MapReduce computing framework and Hbase database. The leakage fault cases verify the algorithm�s applicability and complete the correlation diagnosis of water wall leakage fault. …”
Article -
18
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
19
-
20
Propositional satisfiability method in rough classification modeling for data mining
Published 2002“…The goal of data mining is to find rules that model the world sufficiently well. …”
Get full text
Get full text
Thesis
