Search Results - (( java implementation mining algorithm ) OR ( data compression modified algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- data compression »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
DNA sequences compression by GP2R and selective encryption using modified RSA technique
Published 2020“…The proposed algorithm is a new Lossless Compression algorithm, which compresses data, based on two tiers. …”
Get full text
Get full text
Get full text
Article -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Use of new efficient lossless data compression method in transmitting encrypted Baptista symmetric chaotic cryptosystem data
Published 2016“…The purposed algorithm has fast encoding and decoding mechanism and proven analytically to be a lossless data compression technique. …”
Get full text
Get full text
Article -
8
Soap performance enhancement for high volume messaging / Ali Baba Dauda
Published 2018“…To achieve this aim, LZ77 compression algorithm is modified to encode more symbols. …”
Get full text
Get full text
Get full text
Thesis -
9
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Frame selection based on modified entropy and object motion for secured data hiding in videos
Published 2021“…A message was embedded by modifying middle DCT coefficients using the proposed algorithm. …”
Get full text
Get full text
Thesis -
11
Review of wavelet theory and its application to image data compression
Published 2003“…Advantages over Fourier transform is investigated and several results are derived. The pyramid algorithm is also presented and some features of wavelets in image data compression are given. …”
Get full text
Get full text
Get full text
Article -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
13
Wavelets image data compression
Published 1998Get full text
Get full text
Get full text
Proceeding Paper -
14
Compression of Three-Dimensional Terrain Data Using Lifting Scheme Based on Second Generation Wavelets
Published 2006“…The newly developed algorithm was applied to compress Light Detection and Ranging (LIDAR) data to check the efficiency of the program. …”
Get full text
Get full text
Thesis -
15
Development Of A Robust Blind Digital Video Watermarking Algorithm Using Discrete Wavelet Transform
Published 2007“…Video watermarking technology enables us to hide an imperceptible, robust, and secure data in digital or analog video. This data can be used for tracking, fingerprinting, copyright infringement detection or any other application that requires some hidden data. …”
Get full text
Get full text
Thesis -
16
Video steganography based on DCT psychovisual and object motion
Published 2020“…A message is embedded by modifying middle DCT coefficients using the proposed algorithm. …”
Get full text
Get full text
Get full text
Article -
17
Video steganography based on DCT psychovisual and object motion
Published 2020“…A message is embedded by modifying middle DCT coefficients using the proposed algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Securing Data Using Deep Hiding Selected The Least Significant Bit And Adaptive Swarm Algorithm
Published 2024journal::journal article -
19
Handwriting recognition using webcam for data entry
Published 2014“…The Handwriting Recognition using Webcam for Data Entry project has its primary purpose to develop a system or algorithm that is robust enough to recognize numerical handwritings. …”
Get full text
Get full text
Final Year Project -
20
Handwriting recognition using webcam for data entry
Published 2015“…However, the testing were later enhanced with another feature extraction module, which consists of the combination of Character Vector Module, Kirsch Edge Detection Module, Alphabet Profile Feature Extraction Module, Modified Character Module and Image Compression Module. …”
Get full text
Get full text
Conference or Workshop Item
