Search Results - (( java implementation mining algorithm ) OR ( data compression detection algorithm ))
Search alternatives:
- implementation mining »
- compression detection »
- java implementation »
- mining algorithm »
- data compression »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Compression Header Analyzer Intrusion Detection System (CHA - IDS) for 6LoWPAN Communication Protocol
Published 2018“…In this paper, we propose an IDS known as compression header analyzer intrusion detection system (CHA-IDS) that analyzes 6LoWPAN compression header data to mitigate the individual and combination routing attacks. …”
Get full text
Get full text
Article -
9
Research on the construction of an efficient and lightweight online detection method for tiny surface defects through model compression and knowledge distillation
Published 2024“…In response to the current issues of poor real-time performance, high computational costs, and excessive memory usage of object detection algorithms based on deep convolutional neural networks in embedded devices, a method for improving deep convolutional neural networks based on model compression and knowledge distillation is proposed. …”
Get full text
Get full text
Article -
10
Fault detection of aircraft engine components using fuzzy unordered rule induction algorithm
Published 2016“…This paper proposes auto encoder neural network for compressing of high dimensional sensory data and classification using Fuzzy Unordered Rule Induction Algorithm (FURIA) with emphasis on detection and isolation of incipient faults. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Performance evaluation for compression-accuracy trade-off using compressive sensing for EEG-based epileptic seizure detection in wireless tele-monitoring
Published 2013“…Discrete cosine transform (DCT) and compressive sensing are used for EEG signals acquisition and compression.To obtain low-complexity energy-efficient, the best data accuracy with higher compression ratio is sought. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
An enhance embedding method using edge and textures detection for image steganography
Published 2024“…This compression can lead to content loss and makes the hidden data vulnerable to steganalysis. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
Get full text
Get full text
Thesis -
14
Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform
Published 2007“…Video watermarking technology enables us to hide an imperceptible, robust, and secure data in digital or analog video. This data can be used for tracking, fingerprinting, copyright infringement detection or any other application that requires some hidden data. …”
Get full text
Get full text
Thesis -
15
Compressed Sensing Implementations For Sparse Channel Estimation In OFDM Systems
Published 2018“…Additionally, at BER value of 2×10−3 the proposed CoFA and SdMP algorithms for CE have around 9%, 14%, 19.5% and 25% and around 5%, 10%, 14% and 22.5% performance improvement when compared to FACS, gOMP, OMP and ROMP algorithms, respectively.…”
Get full text
Get full text
Thesis -
16
Real-time time series error-based data reduction for internet-of-things applications
Published 2018“…There are many time series data reduction methods, ranging from primitive data aggregation such as Rate of Change to sophisticated compression algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Enhancement of most significant bit (MSB) algorithm using discrete cosine transform (DCT) in non-blind watermarking / Halimah Tun Abdullah
Published 2014“…This is because many attackers attempt to retrieve the secret data from an image than audio and video. The algorithm and techniques that implemented in this project is Most Significant Bit (MSB) algorithm and Discrete Cosine Transform (OCT) as a technique for embedding process. …”
Get full text
Get full text
Thesis -
18
Frame selection based on modified entropy and object motion for secured data hiding in videos
Published 2021“…Videos provide additional hidden-space in the video data. Compression methods have been widely applied in multimedia applications. …”
Get full text
Get full text
Thesis -
19
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The minimum description length is an important concept in information theory and computational learning in which the best hypothesis for a given data set is the one that leads to the best compression of the data. …”
Get full text
Get full text
Thesis -
20
Sauvola Segmentation and Support Vector Machine-Salp Swarm Algorithm Approach for Identifying Nutrient Deficiencies in Citrus Reticulata Leaves
Published 2024“…Integrating SSA and SVM machine learning algorithms improves decision-making processes, leading to better crop yield through early detection and timely nutrient management. …”
Get full text
Get full text
Get full text
Get full text
Thesis
