Search Results - (( java implementation mechanism algorithm ) OR ( parameter implementation mining algorithm ))
Search alternatives:
- implementation mechanism »
- parameter implementation »
- implementation mining »
- java implementation »
- mechanism algorithm »
- mining algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
2
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
Get full text
Get full text
Thesis -
4
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis -
5
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
Review -
6
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
7
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014“…This project proposed a data mining technique called Association Rule Mining. Basically Association Rule Mining is to investigate the rules according to the predefined parameter. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Improving Class Timetabling using Genetic Algorithm
Published 2006“…Hence, the major aim of this research is to investigate the internal mechanism of genetic algorithm in solving and improving class timetabling problem. …”
Get full text
Get full text
Get full text
Thesis -
9
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
10
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Classification of breast cancer disease using bagging fuzzy-id3 algorithm based on fuzzydbd
Published 2022“…For the proposed technique of the FID3-DBD algorithm, the continuous and discrete (integer) attributes would be defined in the linguistic values of the fuzzy sets, and the FUZZYDBD method is being used to set up the fuzzy sets’ parameters. …”
Get full text
Get full text
Thesis -
13
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
14
RAED: Response Analysis of Educational Data for leveraging knowledge dissemination system
Published 2015“…The proposed architecture provides future researchers to validate their algorithm and get the provisioned output for the teaching-learning added for intelligent applications Keywords; Educational Data, Big Data, Data Analytics, Data Mining, Knowledge Discovery…”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Learner’s emotion prediction using production rules classification algorithm through brain computer interface tool
Published 2018“…These rule sets was implemented in the MYEmotion using MATLAB environment. …”
Get full text
Get full text
Thesis -
16
-
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
18
Identification of debris flow initiation zones using topographic model and airborne laser scanning data
Published 2017“…MARSpline multivariate data mining predictive approach was implemented using morphometric indices and topographical derived parameter as independent variables. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The simulation results for the first and second models are done using the data obtained from Malaysia distribution network (DISCO-Net) and 69 bus test system that were implemented using Java Agent Development Framework package software. …”
Get full text
Get full text
Thesis -
20
Dynamic investment model for the restructed power market in the presence of wind source
Published 2014“…The proposed framework has been implemented in the hypothetical restructured power market using the IEEE Reliability Test System. …”
Get full text
Get full text
Thesis
