Search Results - (( java implementation level algorithm ) OR ( using computational mining algorithm ))
Search alternatives:
- implementation level »
- computational mining »
- java implementation »
- mining algorithm »
- level algorithm »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Modifying iEclat algorithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
3
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…However, this is a step stone towards developing a biological-inspired Sentiment Mining algorithm…”
Get full text
Get full text
Thesis -
4
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
5
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…This study has indicated that data mining can be a useful tool in the medical field. …”
Get full text
Get full text
Get full text
Article -
6
Mining Of Resource Usage Using Evoc Algorithm In Grid Environment.
Published 2007Get full text
Get full text
Conference or Workshop Item -
7
Energy efficiency of the bitcoin mining hardware and related blockchain technology
Published 2018Get full text
Get full text
Get full text
Undergraduates Project Papers -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
9
An efficient algorithm to discover large and frequent itemset in high dimensional data
Published 2019“…For this reason, this research has proposed two new algorithms; RARE and RARE II, which mine colossal closed itemsets. …”
Get full text
Get full text
Monograph -
10
First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms
Published 2014“…From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Improved BVBUC algorithm to discover closed itemsets in long biological datasets
Published 2019“…Therefore, this paper proposed a method for computing closure compare with the method used in BVBUC algorithm method. …”
Get full text
Get full text
Get full text
Article -
12
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…Depth first strategy and vertical counting strategy are used in mining frequent patterns and computing the support of the patterns respectively. …”
Get full text
Get full text
Thesis -
13
-
14
Mining least relational patterns from multi relational tables
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An Efficient Data Structure for General Tree-Like Framework in Mining Sequential Patterns Using MEMISP
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Frequent itemset mining in high dimensional data: a review
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
17
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
18
-
19
-
20
Computational Discovery of Motifs Using Hierarchical Clustering Techniques
Published 2008Get full text
Get full text
Get full text
Proceeding
