Search Results - (( java implementation level algorithm ) OR ( problem implementation mining algorithm ))
Search alternatives:
- problem implementation »
- implementation mining »
- implementation level »
- java implementation »
- mining algorithm »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
3
A Rough-Apriori Technique in Mining Linguistic Association Rules
Published 2008“…It uses the rough membership function to capture the linguistic interval before implementing the Apriori algorithm to mine interesting association rules. …”
Get full text
Get full text
Get full text
Book Chapter -
4
ANALYSIS OF CUSTOMER SERVICE BUSINESS PROCESS USING DATA MINING
Published 2020“…Hence, this paper contribute to justify by the basic concepts of data mining, described the selected types and models of algorithms, and the process of data mining by using R Tools.…”
Get full text
Get full text
Final Year Project -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Comparative study of apriori-variant algorithms
Published 2016“…One of data mining methods is frequent itemset mining that has been implemented in real world applications, such as identifying buying patterns in grocery and online customers’ behavior.Apriori is a classical algorithm in frequent itemset mining, that able to discover large number or itemset with a certain threshold value. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
8
-
9
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
10
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
11
Analysis of Data Mining Tools for Android Malware Detection
Published 2019“…However, the problem arises in deciding the most appropriate machine learning techniques or algorithm on particular tools to be implemented on particular data. …”
Get full text
Get full text
Get full text
Article -
12
A novel approach to data mining using simplified swarm optimization
Published 2011“…Therefore, the proposed SSO rule-based classifier with local search strategies has offered a new paradigm shift in solving complex problems in data mining which may not be able to be solved by other benchmark classifiers.…”
Get full text
Get full text
Thesis -
13
Attribute related methods for improvement of ID3 Algorithm in classification of data: A review
Published 2020“…Decision tree is an important method in data mining to solve the classification problems. There are several learning algorithms to implement the decision tree but the most commonly-used is ID3 algorithm. …”
Get full text
Get full text
Get full text
Article -
14
An enhanced intelligent database engine by neural network and data mining
Published 2000“…An Intelligent Database Engine (IDE) is developed to solve any classification problem by providing two integrated features: decision-making by a backpropagation (BP) neural network (NN) and decision support by Apriori, a data mining (DM) algorithm. …”
Get full text
Get full text
Article -
15
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
16
Y-type Random 2-satisfiability In Discrete Hopfield Neural Network
Published 2024“…Additionally, the proposed Hybrid Differential Evolution Algorithm was implemented into the training phase to ensure that the cost function of the Discrete Hopfield Neural Network is minimized. …”
Get full text
Get full text
Thesis -
17
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
18
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
19
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…However, frequent pattern mining (FPM) using Apriori-like algorithms and support-confidence framework suffers from the myth of rare item problem in nature. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Case Slicing Technique for Feature Selection
Published 2004“…Finding a good classification algorithm is an important component of many data mining projects. …”
Get full text
Get full text
Thesis
