Search Results - (( java implementation _ algorithm ) OR ( using spatial mining algorithm ))
Search alternatives:
- java implementation »
- mining algorithm »
- spatial mining »
- using spatial »
-
1
An extended ID3 decision tree algorithm for spatial data
Published 2011“…It is because spatial data mining algorithms have to consider not only objects of interest itself but also neighbours of the objects in order to extract useful and interesting patterns. …”
Get full text
Get full text
Conference or Workshop Item -
2
SPATIAL DATA MINING TOOLBOX FOR MAPPING SUITABILITY OF LANDFILL SITES USING NEURAL NETWORKS
Published 2016“…The purpose of this research is to create an ArcGIS spatial data mining toolbox for mapping the suitability of landfill sites at a regional scale using neural networks. …”
Get full text
Get full text
Get full text
Article -
3
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…Empirical result demonstrates that the proposed algorithm can be used to join two spatial objects in constructing a spatial decision tree from a spatial dataset. …”
Get full text
Get full text
Get full text
Article -
4
Modeling forest fires risk using spatial decision tree
Published 2011Get full text
Get full text
Conference or Workshop Item -
5
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
6
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…With the rapid growth of satellite technology and the increasing of spatial resolution, hyperspectral imaging sensor is frequently used for research and development as well as in some semi-operational scenarios. …”
Get full text
Get full text
Conference or Workshop Item -
7
Application of terrain analysis to the mapping and spatial pattern analysis of subsurface geological fractures of Kuala Lumpur limestone bedrock, Malaysia.
Published 2012“…Unlike wavelet analysis and the Fourier transform, which use optical remote-sensing images, the integration of visual interpretation and a topographical fabric algorithm is capable of the extraction and spatial correlation of subsurface geological fractures. …”
Get full text
Get full text
Article -
8
Combining data mining algorithm and object-based image analysis for detailed urban mapping of hyperspectral images
Published 2014“…The images were used to explore the combined performance of a data mining (DM) algorithm and object-based image analysis (OBIA). …”
Get full text
Get full text
Article -
9
Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing
Published 2015“…In the second case, available training data from the first study site were used to conduct the DM task. The proposed OBIA rule sets were automatically organized from the C4.5 algorithm to form a decision tree structure that explores a wide range of spectral, spatial, and textural attributes. …”
Get full text
Get full text
Thesis -
10
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
11
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
12
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
13
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
14
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…Results obtained after pre-processing phase showed that the data quality will improve when the number of records reduced by (51.45). The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
Get full text
Get full text
Article -
15
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
16
Spatial Data Mining Model For Landfill Sites Suitability Mapping Based On Neural Networks And Multivariate Analysis
Published 2017“…The learned network was used to acquire the weights of the criteria. The optimum structure of the proposed network was selected using 600,000 use cases. …”
Get full text
Get full text
Thesis -
17
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
18
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
19
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
20
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project
