Search Results - (( java implementation mining algorithm ) OR ( using execution new algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- using execution »
- execution new »
- new algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
-
9
RISC-V instruction set extension on blockchain application
Published 2024“…This would greatly shorten the instructions used by the algorithms and improved the execution time of the programmes. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…In ELB algorithm, the tasks are distributed among resources based on their execution time range. …”
Get full text
Get full text
Get full text
Thesis -
11
Automatic marking system for programming subject
Published 2023“…To achieve this, this project use cloud compute resources that contain Docker container which act as an isolation for anonymous code execution. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Replica Creation Algorithm for Data Grids
Published 2012“…The new Data Replica Creation Algorithm (DRCM) improves performance of data grid systems by reducing job execution time and making the best use of data grid resources (network bandwidth and storage space). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
New approach of cryptography algorithm for e- mail applications
Published 2005“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Conference or Workshop Item -
14
New signed-digit {0,1,3}-NAF scalar multiplication algorithm for elliptic curve over binary field
Published 2011“…The special NAF property is adopted in the new {0,1,3}-NAF scalar. Also, a new point tripling formula and algorithm are introduced for elliptic curve over binary field using Lopez-Dahab projective coordinates. …”
Get full text
Get full text
Thesis -
15
A discrete simulated kalman filter optimizer for combinatorial optimization problems
Published 2022“…First, the DSKFO algorithm is used to solve the travelling salesman problem (TSP), and then the algorithm's execution time is measured. …”
Get full text
Get full text
Thesis -
16
FaaSBid: an auction-based model for Function as a Service in edge-fog environments using unallocated resources
Published 2026“…Next, the Dynamic Demand Replacement Algorithm (DDRA) algorithm is used to place in-demand functions near the edge nodes periodically, while the proposed task scheduling algorithm - Maximum Revenue Bid (MRB) is used to give priority to tasks to maximise revenue near the edge. …”
Get full text
Get full text
Get full text
Article -
17
New approach of hidden data in the portable executable file without change the size of carrier file using statistical technique
Published 2009“…The new proposed system is able to embed information in an execution file without change the size of execution file. …”
Get full text
Get full text
Get full text
Article -
18
-
19
A GreedyZero algorithm to minimise the conflicts in an Optical Multistage Interconnection Network
Published 2014“…In this paper, we have proposed a new algorithm to minimise the number of conflicts of OMINs using the greedy graph colouring and Zero algorithm. …”
Get full text
Get full text
Get full text
Article -
20
Fault tolerance grid scheduling with checkpoint based on ant colony system
Published 2017“…This study proposed Dynamic ACS-based Fault Tolerance in grid computing using resubmission to new resource, checkpoint technique and utilization of resource execution history with the aim to reduce execution and task processing time and to increase the success rate in grid environment. …”
Get full text
Get full text
Get full text
Article
