Search Results - (( java implementation mining algorithm ) OR ( program usage generation algorithm ))
Search alternatives:
- implementation mining »
- generation algorithm »
- java implementation »
- mining algorithm »
- usage generation »
- program usage »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Comparative of rivest-shamir-adleman Cryptosystem and its four variants using running time and memory Consumption analysis
Published 2024“…The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. …”
Get full text
Get full text
Get full text
Article -
9
Comparative of Rivest-Shamir-Adleman cryptosystem and its four variants using running time and memory consumption analysis
Published 2024“…The methodology involves evaluating the theoretical running time and memory usage through single-precision multiplication (spm) measurements, while the actual running time is estimated using Maple programming. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Optimizing tree planting areas through integer programming and improved genetic algorithm
Published 2012“…Therefore, a hybrid algorithm through an incorporation of Integer Programming and Improved Genetic Algorithm was proposed for planting lining design. …”
Get full text
Get full text
Thesis -
12
Elitist hybrid migrating birds optimization and genetic algorithm based strategy for T-way test suite generation
Published 2020“…Therefore, this study concludes that that Elitist Hybrid MBO-GA is a useful strategy for generating t-way test suite generation.…”
Get full text
Get full text
Thesis -
13
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. …”
Get full text
Get full text
Final Year Project -
14
Cognitive selection mechanism performance in IEEE 802.11 WLAN
Published 2013“…Recent growth in Wireless Local Area Network (WLAN) usage has generated considerable interest in the establishment of the IEEE 802.11 WLAN standards. …”
Get full text
Get full text
Get full text
Article -
15
Hybridization solution of electrical energy demand response and forecasting program by using PSO-LSSVM technique
Published 2023“…The proposed formulation of the ETOU optimization achieves an energy cost savings of up to 7.57% (PSO) and 7.98% (PSO-LSSVM), and the proposed models are intended to lower the cost of electrical energy usage across all price ranges. The study's findings will assist manufacturers in transitioning to the ETOU tariff and contribute to the national DSM initiative program. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…The demand for efficient and secure ciphers has given rise to a new generation of block ciphers capable of providing increased protection at lower cost. …”
Get full text
Conference or Workshop Item -
17
-
18
Bridging Mayer’s cognitive theory of multimedia learning and computational thinking in tackling the cognitive load issues among young digital natives : a conceptual framework
Published 2022“…Learning about computer science not only helps students to create programs, applications or how to handle devices, but strengthens the practise of Computational Thinking (CT). …”
Get full text
Get full text
Get full text
Article -
19
Resource allocation techniques for downlink Non-Orthogonal Multiple Access-Based 5G wireless systems
Published 2021“…The results show that the femtocell user’s minimum energy efficiency by applying NOMA with power allocation method using Sequential Convex Programming and user pairing based on Greedy Algorithm (NOMA-SCP-GA) is higher by 38.22 %, 58.84 %, and 76.39 % compared to NOMA-DC, NOMA-FTPA, and OFDMA methods respectively. …”
Get full text
Get full text
Thesis -
20
Designing machine learning frameworks for intelligence and gamification research / Nordin Abu Bakar
Published 2016“…The central part of this subject is described in terms of frameworks or algorithms that explains how to achieve better performance. …”
Get full text
Get full text
Thesis
