Search Results - (( java implementation mining algorithm ) OR ( using filing system algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- system algorithm »
- filing system »
- using filing »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
A Comparative Study on Compression of Different Image File Formats
Published 1999“…In this project, an image compression format and algorithm has been analyses. A system has been created for user to convert or display image file format. …”
Get full text
Get full text
Thesis -
8
Enhanced Storage Mechanism for Secured Parallel Network File System
Published 2018“…The proposed techniques resulted synchronous LEASE file locking, capturing of state of locks and layouts, Kerberos secured the pNFS locks and layouts on storage, new algorithm enabled the scalable data compression using data block size compression algorithm and better dynamic data protection using RAID.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Classification of JPEG files by using extreme learning machine
Published 2018Get full text
Get full text
Article -
10
Improved rsync algorithm to minimize communication cost using multi-agent systems for synchronization in multi-learning management systems
Published 2017“…These types of agents have different capabilities, actions, and efficiency to the irsync algorithm in file synchronization. The study proposed MAS framework in the Learning Management System (LMS) that involves the transfer of data from one machine to another. …”
Get full text
Get full text
Get full text
Thesis -
11
Relationship based replication algorithm for data grid
Published 2014“…Data Grid is an infrastructure that manages huge amount of data files and provides intensive computational resources across geographically distributed systems.To increase resource availability and to ease resource sharing in such environment, there is a need for replication services.This research proposes a replication algorithm, termed as Relationship based Replication (RBR) that integrates users, grid and system perspective.In particular, the RBR includes information of three different relationships in identifying file(s) that requires replication; file-to-user, file-to-file and file-to-grid. …”
Get full text
Get full text
Monograph -
12
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian
Published 2019“…This study uses machine learning method to detect anomalies in system log files. …”
Get full text
Get full text
Get full text
Thesis -
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
15
Keyword indexing for text documents using signature files / Abdul Hakim A. Gafa
Published 2008“…The main of this project is to compare the effectiveness of searching Text documents between using Signature files algorithm and Inverted files algorithm. …”
Get full text
Get full text
Thesis -
16
Dynamic replication algorithm in data grid: Survey
Published 2008“…Data replication is a common method used to improve the performance of data access in distributed systems. …”
Get full text
Get full text
Get full text
Book Section -
17
Development of the Multipurpose Integrated Multimedia Presentation System Based on the CCM Algorithm
Published 2010“…human’s life sectors. People use many file types of each multimedia element such as file type of videos, audios, images,graphs, animations, texts and also live video streaming. …”
Get full text
Get full text
Conference or Workshop Item -
18
A log file analysis technique using binary-based approach
Published 2014“…Log files are an important by product of any computing systems including database systems. …”
Get full text
Get full text
Article -
19
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…The results show that the most time lagging comes from image files, followed by PDF files, and then text files Moreover the encryption and decryption process using the modified system is around twice faster than the old system.…”
Get full text
Get full text
Thesis -
20
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The simulation was conducted using File Alyzer, Clone Files Checker and AllDup software. …”
Get full text
Get full text
Thesis
