Search Results - (( java implementation _ algorithm ) OR ( using sparse ((using algorithm) OR (mining algorithm)) ))
Search alternatives:
- java implementation »
- mining algorithm »
- using algorithm »
- using sparse »
-
1
Prime-based method for interactive mining of frequent patterns
Published 2010“…Moreover, this study introduces a mining algorithm called PC-miner to mine the mining model frequently with various values of minsup. …”
Get full text
Get full text
Thesis -
2
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…Considering the unsupervised learning algorithms, Self-Organizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
An improved self organizing map using jaccard new measure for textual bugs data clustering
Published 2018“…Considering the unsupervised learning algorithms, SelfOrganizing Map (SOM) considers the equally compatible algorithm for clustering, as both algorithms are closely related but different in way they were used in data mining. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Semi-supervised learning for feature selection and classification of data / Ganesh Krishnasamy
Published 2019“…The proposed algorithm is compared with the state-of-the-art feature selection algorithms using three different datasets. …”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…In some cases, they are quite distant and sparseness. This uniqueness of Y-STR data has become problematic in partitioning the data using the existing partitional clustering algorithms. …”
Get full text
Get full text
Thesis -
7
A multi-layer dimension reduction algorithm for text mining of news in forex / Arman Khadjeh Nassirtoussi
Published 2015“…The major finding of this review is that context-specific text mining algorithms are lacking. The main underlying text-mining challenge that seems to deserve immediate attention is the sparse and high dimensional nature of the feature-space. …”
Get full text
Get full text
Thesis -
8
Document classification based on kNN algorithm by term vector space reduction
Published 2023Conference Paper -
9
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
10
Class binarization with self-adaptive algorithm to improve human activity recognition
Published 2018“…Therefore, feature selection using Relief-f with self-adaptive Differential Evolution (rsaDE) algorithm is proposed to select the most significant features. …”
Get full text
Get full text
Thesis -
11
An improved public key cryptography based on the elliptic curve
Published 2002“…Moreover, the new formula can be used more efficiently when it is combined with the suggested sparse elements algorithms. …”
Get full text
Get full text
Thesis -
12
Evaluation of sparsifying algorithms for speech signals
Published 2012“…Sparse representations of signals have been used in many areas of signal and image processing. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
14
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Moreover, sparse coding has been commonly used in recent years for the purposes of retrieving and identifying images. …”
Get full text
Get full text
Get full text
Article -
15
Blind Source Separation Using Two-Dimensional Nonnegative Matrix Factorization In Biomedical Field
Published 2018“…Theoretically,β and α is parameters that used to vary the NMF2D algorithm in order to yield high SDR value. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems
Published 2018“…However, such information is seldom available a priori and needs to beestimated. CS uses the prior knowledge that many physical signals are sparse and acquire them with few measurements. …”
Get full text
Get full text
Thesis -
17
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
18
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
19
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
20
