Search Results - (( java implementation _ algorithm ) OR ( pattern mining effect algorithm ))
Search alternatives:
- java implementation »
- effect algorithm »
- pattern mining »
- mining effect »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Prime-based method for interactive mining of frequent patterns
Published 2010“…Since rerunning the mining algorithms from scratch can be very time consuming, researchers have introduced interactive mining to find proper patterns by using the current mining model with various minsup. …”
Get full text
Get full text
Thesis -
3
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…The approach in the offline phase is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining. …”
Get full text
Get full text
Thesis -
4
A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm.
Published 2009“…In this paper, to provide online predicting effectively, we develop a model for online predicting through web usage mining system and propose a novel approach for classifying user navigation patterns to predict users’ future intentions. …”
Get full text
Get full text
Article -
5
Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.]
Published 2024“…The proposed method is based on comparing two algorithms: Apriori and Frequent Pattern Growth (FP- Growth). …”
Get full text
Get full text
Article -
6
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…Data mining can discover patterns or rules from a vast volume of data. …”
Get full text
Get full text
Conference or Workshop Item -
7
Web usage mining: A review of recent works
Published 2015“…Our objective is to provide an overview of web usage mining concepts relevant to pattern mining phase of web usage mining process. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Effective mining on large databases for intrusion detection
Published 2014Get full text
Get full text
Conference or Workshop Item -
9
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
10
WebPUM : a web-based recommendation system to predict user future movements.
Published 2010“…The approach is based on the new graph partitioning algorithm to model user navigation patterns for the navigation patterns mining phase. …”
Get full text
Get full text
Get full text
Article -
11
Improving mining efficiency: A new scheme for extracting association rules
Published 2009“…Extracting the association rule from this data is one of the important tasks in data mining.Most of the existing association rules in algorithms typically assume that the data set can fit in the memory.In this paper, we propose a practical and effective scheme to mine association rules from frequent patterns, called Prefixfoldtree scheme (PFT scheme).The original dataset is divided into folds, and then from each fold the frequent patterns are mined by using the tree projection approach.These frequent patterns are combined into one set and finally interestingness constraints are used to extract the association rules.The experiments will be conducted to illustrate the efficiency of our scheme.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Although effective, the performance of the k-means clustering algorithm depends heavily on the initial centroids and the number of clusters, k. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Although effective, the performance of the k-means clustering algorithm depends heavily on the initial centroids and the number of clusters, k. …”
Get full text
Get full text
Article -
14
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
15
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
16
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
17
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
18
Mining Web usage using FRS
Published 2018“…A mining algorithm is introduced using the approach of vertical database. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item
