Search Results - (( java implementation level algorithm ) OR ( causing process mining algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- mining algorithm »
- level algorithm »
- causing process »
- process mining »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
4
An Improved C4.5 Data Mining Driven Algorithm for the Diagnosis of Coronary Artery Disease
Published 2019“…This disease is not epidemic but it re-mains the single most common cause of death. This research used an im-proved C4.5 data mining algorithm for the diagnosis of CAD. …”
Get full text
Get full text
Conference or Workshop Item -
5
Comparison of Statistic Prediction Results in Weka Explorer Interface and Experimenter Environment Interface on Dataset
Published 2019“…With the increased interest into data mining as an important tool for data processing and analysis, the researchers are concerned into data mining for real decision making, data mining helps in the organizational decision making, inaccurate information can mislead decisionmakers and cause costly errors. …”
Get full text
Get full text
Get full text
Article -
6
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2023“…The PNDT consists of five components: agent's belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent's belief base with new normative protocol. …”
Short Survey -
7
Analysis of Feature Selection Methods for Sentiment Analysis Concerning Covid-19 Vaccination Issues
Published 2023“…Sentiment analysis is one of the most active research areas in natural language processing, data mining, information retrieval, and web mining. …”
Get full text
Get full text
Get full text
Article -
8
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
9
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
10
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
11
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…In addition, exponential growth of data causes high computational costs in Apriori-like algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Identifying significant features and data mining techniques in predicting cardiovascular disease / Mohammad Shafenoor Amin
Published 2018“…Researchers have often focused towards the diagnosis by using different algorithms, sometimes even using the hybrid algorithm. …”
Get full text
Get full text
Get full text
Thesis -
13
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
14
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
15
Automatic clustering of gene ontology by genetic algorithm
Published 2006“…However, the increase in size of the Gene Ontology has caused problems in maintaining and processing them. …”
Get full text
Get full text
Article -
16
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
Get full text
Get full text
Thesis -
17
Diabetes Diagnosis And Level Of Care Fuzzy Rule-Based Model Utilizing Supervised Machine Learning For Classification And Prediction
Published 2024“…This assists medical practitioners to detect a disease at early stage especially diabetes that causes further health complications. The diversity and availability of healthcare datasets supports medical practitioners to use computer applications in the diagnosis process. …”
Get full text
Get full text
Get full text
Article -
18
Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak
Published 2018“…Based on the trend shows more activities done during the holiday and the attacking activity also frequently happen during the weekend or public holiday. Data mining process lead to reveal the information gather for profiling purposes and identify type of traffic passing through the BSIS network. …”
Get full text
Get full text
Thesis -
19
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…Experimental results are compared with other alternative online/offline hybrid density-based clustering algorithms. The average processing time for data point in the data stream is about 2 milliseconds which is much lower than the aligned clustering algorithms in literature. …”
Get full text
Get full text
Thesis -
20
Building norms-adaptable agents from Potential Norms Detection Technique (PNDT)
Published 2013“…The PNDT consists of five components: agent’s belief base; observation process; Potential Norms Mining Algorithm (PNMA) to detect the potential norms and identify the normative protocol; verification process, which verifies the detected potential norms; and updating process, which updates the agent’s belief base with new normative protocol. …”
Get full text
Get full text
Article
