Search Results - (( java implementation mining algorithm ) OR ( using advanced process algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- process algorithm »
- mining algorithm »
- using advanced »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Enhancement of text-based advanced encryption standard algorithm (AES) in the android platform / Mohamad Zakirin Mohammad Zahari
Published 2014“…This will help to speed up the algorithm because mix column step was using high calculation and needs a lot of time to process it. …”
Get full text
Get full text
Thesis -
9
Fast decryption method for a Rabin primitive-based cryptosystem
Published 2014Get full text
Get full text
Get full text
Article -
10
Formulation of model predictive control algorithm for nonlinear processes
Published 2004“…However, with faster computing technology, the industry is now demanding a tighter advanced control strategy. To fulfil all these objectives, Model Predictive Control (MPC), an optimal model based control algorithm is definitely the best choice among all the advanced control algorithms available to date. …”
Get full text
Get full text
Monograph -
11
Design and implementation of advanced encryption standard using verilog HDL
Published 2022“…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Ground receiving station reference pair selection technique for a minimum configuration 3D emitter position estimation multilateration system
Published 2017“…The Position Estimation (PE) accuracy of the lateration algorithm depends on several factors which are the TDOA estimation error, the lateration algorithm approach, the number of deployed GRSs and the selection of the GRS reference used for the PE process. …”
Get full text
Get full text
Article -
13
-
14
-
15
Monkey Algorithm for Packing Circles with Binary Variables
Published 2019Get full text
Get full text
Article -
16
Monkey Algorithm for Packing Circles with Binary Variables
Published 2019Get full text
Get full text
Article -
17
Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time
Published 2021“…This paper propose a Secured Modified Advanced Encryption Standard Algorithm with decreasing the rounds of Advanced Encryption Standard (AES) to 14 rounds in order to minimize encryption and decryption process time and increasing digital data security as well. …”
Get full text
Get full text
Get full text
Article -
18
Design and Implementation of Advanced Encryption Standard Using Verilog HDL
Published 2020“…The focus of this paper is to match with the existing cryptography algorithm, 128-bit Advanced Encryption Algorithm and improving the processing speed for the design with hardware implementation. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
A DNA-dynamic permutation-diffusion algorithm for image encryption using scaling chaotification models and advanced DNA operations
Published 2025“…To overcome these challenges, this paper proposes the DNA-Dynamic Concurrent Permutation-Diffusion Algorithm (DNA-DCP-DA), which introduces four advanced encryption mechanisms. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
Gaze Tracking Algorithm Using Night Vision Camera
Published 2018“…Two image processing algorithms are then used, each with owns tradeoff between speed and accuracy.Analysis on both algorithms shows good tracking performance despite of the mentioned tradeoff.…”
Get full text
Get full text
Get full text
Article
