Search Results - (( java implementation level algorithm ) OR ( using systems mining algorithm ))
Search alternatives:
- implementation level »
- java implementation »
- mining algorithm »
- level algorithm »
- systems mining »
- using systems »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…Web usage mining algorithms have been widely utilized for modeling user web navigation behavior. …”
Get full text
Get full text
Article -
4
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
5
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…This huge amount of data can be a useful source of knowledge. Advanced mining processes are needed for this knowledge to be extracted, understood and used. …”
Get full text
Get full text
Article -
6
DATA CLASSIFICATION SYSTEM WITH FUZZY NEURAL BASED APPROACH
Published 2005“…Theresult of this system using the iris dataset and credit card approval dataset to evaluate the proposed algorithm's accuracy, interpretability. …”
Get full text
Get full text
Final Year Project -
7
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…This study has indicated that data mining can be a useful tool in the medical field. …”
Get full text
Get full text
Get full text
Article -
8
A collaborative filtering recommender system for infrequently purchased product using slope-one algorithm and association rule mining
Published 2015“…This recommender system uses slope-one algorithm whereby it accumulate and takes into account of the difference in popularity. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A recommender system approach for classifying user navigation patterns using longest common subsequence algorithm.
Published 2009“…A variety of the recommender systems for online personalization through web usage mining have been proposed. …”
Get full text
Get full text
Article -
10
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
11
Data mining using genetic algorithm in finance data / A. Noor Latiffah and A. B. Nordin
Published 2006“…This patterns or rules may help to develop better decision-making process. Data mining is primarily used in finance and business environment to extract knowledge from financial, retail, communication and marketing data. …”
Get full text
Get full text
Conference or Workshop Item -
12
An application of IPA approach on the optimization of a mining port stockyard system
Published 2002“…In this research a stockyard system of a mining operation was analyzed using backward analysis. …”
Get full text
Get full text
Get full text
Proceeding Paper -
13
Energy efficiency of the bitcoin mining hardware and related blockchain technology
Published 2018“…MATLAB is used in developing and validation the algorithm. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
14
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003“…Then, the system implementation part explains the selected tools chosen for implementing the system which using the Clementine Data Mining Solution. …”
Get full text
Get full text
Thesis -
15
Efficient prime-based method for interactive mining of frequent patterns.
Published 2011Get full text
Get full text
Article -
16
A Web-Based Recommendation System To Predict User Movements Through Web Usage Mining
Published 2009“…In the online phase, the longest common subsequence algorithm is used as a new approach in recommendation system for classifying current user activities to predict user next movements. …”
Get full text
Get full text
Thesis -
17
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
18
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
19
Predicting future sales using genetic algorithm: data mining sales / Siti Hajar Yaacob
Published 2014“…The objectives of this research are data mining are used to extract useful data from sales and product. …”
Get full text
Get full text
Thesis -
20
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article
