Search Results - (( java implementation level algorithm ) OR ( using mode mining algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- mining algorithm »
- level algorithm »
- mode mining »
- using mode »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms
Published 2014“…From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
4
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
5
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
6
Partitional clustering algorithms for highly similar and sparseness y-short tandem repeat data / Ali Seman
Published 2013“…For the overall performances which were based on the six data sets, the &-AMH algorithm recorded the highest mean accuracy scores of 0.93 as compared to the other algorithms: the ^-Population (0.91), the &-Modes-RVF (0.81), the New Fuzzy &-Modes (0.80), A:-Modes (0.76), &-Modes-HI (0.76), £-Modes- HII (0.75), Fuzzy £-Modes (0.74) and £-Modes-UAVM (0.70). …”
Get full text
Get full text
Thesis -
7
Data Mining Analysis Of Chronic Kidney Disease (CKD) Level
Published 2022“…Adding the uncertain class the best accuracy obtained was 98.5% using the SMO algorithm. A predictive classification model that determines the accuracy for three classification classes was developed accordingly using the SMO algorithm.…”
Get full text
Get full text
Monograph -
8
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
9
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
10
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
11
A novel association rule mining approach using TID intermediate itemset
Published 2018Get full text
Get full text
Article -
12
Analysis Of Failure In Offline English Alphabet Recognition With Data Mining Approach
Published 2019“…Classification analysis was initially performed on all seven classifier’s algorithms at 10-fold dross validation mode. At phase one, Stroke and Curve are added into the dataset and classified respectively. …”
Get full text
Get full text
Monograph -
13
-
14
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
15
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
16
-
17
Improved Salp Swarm Algorithm based on opposition based learning and novel local search algorithm for feature selection
Published 2020“…The second improvement includes the development and use of new Local Search Algorithm with SSA to improve its exploitation. …”
Get full text
Get full text
Article -
18
A new model for iris data set classification based on linear support vector machine parameter's optimization
Published 2020“…The SVM is a one technique of machine learning techniques that is well known technique, learning with supervised and have been applied perfectly to a vary problems of: regression, classification, and clustering in diverse domains such as gene expression, web text mining. In this study, we proposed a newly mode for classifying iris data set using SVM classifier and genetic algorithm to optimize c and gamma parameters of linear SVM, in addition principle components analysis (PCA) algorithm was use for features reduction.…”
Get full text
Get full text
Get full text
Article -
19
A new text-based w-distance metric to find the perfect match between words
Published 2020“…The k-NN algorithm is an instance-based learning algorithm which is widely used in the data mining applications. …”
Get full text
Get full text
Article -
20
Secure E-Voting With Blind Signature
Published 2003“…In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. …”
Get full text
Get full text
Conference or Workshop Item
