Search Results - (( java implementation mining algorithm ) OR ( ((coding using) OR (making using)) data algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- data algorithm »
- coding using »
- making using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
5
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
6
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
7
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
8
Detection of head position using chain code algorithm
Published 2007“…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
Get full text
Get full text
Thesis -
9
Speech coding for Bluetooth with CVSD algorithm
Published 2004“…Speech coding is performed using numerous steps or operations specified as an algorithm. …”
Get full text
Get full text
Get full text
Proceeding Paper -
10
Investigation on the dynamic of computation of semi autonomous evolutionary computation for syntactic optimization of a set of programming codes
Published 2007“…In order to have a realistic characteristic of a parallel computing engine, a Rocks based computer cluster was built and used for the test. Genetic Algorithm as one of the Evolutionary Computation method improve the execution of parallel programming codes by optimizing the number of processors and the distribution of data. …”
Get full text
Get full text
Research Report -
11
Using RGB colour combination in coloured quick response (QR) code algorithm to enhance QR code capacity
Published 2018“…Hence, this thesis proposes a coloured QR Code algorithm which utilizes RGB colour combination to allow a larger data storage. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…The objective of this paper is to improve the security data by using DES algorithm. The substitution technique is applied with addition a XOR operator to enhance the DES algorithm as proposed. …”
Get full text
Get full text
Student Project -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
14
Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code
Published 2022“…The colour QR code is a new generation of B/W QR code which is able to encode three times the data encoded by a B/W QR code. …”
Get full text
Get full text
Thesis -
15
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. Thus, these techniques are unable to detect failures that occur due to the improper use of context data, which is becoming an increasingly common issue in mobile applications nowadays. …”
Get full text
Get full text
Get full text
Thesis -
16
Securing quick response (QR) code using steganography / Muhammad Danial Mohd Alwi
Published 2021“…I have enhancing the QR-code steganography method by using LSB technique in RGB images and QR-code data input image pattern. …”
Get full text
Get full text
Student Project -
17
Implementation of Multigrid Method for Solving Coupled Problem
Published 2021“…Coupled problems were systems involving multiple interacting physical systems, were commonplace in nature, making study of it useful. Multigrid methods were algorithms useful for solving multiresolution problems. …”
Get full text
Get full text
Monograph -
18
Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode
Published 2017“…This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. …”
Get full text
Get full text
Get full text
Article -
19
Secure data communication using blind source separation
Published 2008“…In this paper, we presents a secure(noise-resistant algorithm for data communication over the noisy channel , the message is converted to non-linear Hadamard code, which is having the maximum hamming distance, which makes it more fault-tolerant in comparison to the ASCII input. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Block based low complexity iterative QR precoder structure for Massive MIMO
Published 2021“…We have investigated two performance characteristics, system sum rate and computational complexity using various linear pre-coding schemes, including the proposed one. …”
Get full text
Get full text
Thesis
