Search Results - (( java implementation mining algorithm ) OR ( using text using algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- using algorithm »
- text using »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
5
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
6
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
7
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
A new digital watermarking algorithm using combination of Least Significant Bit (LSB) and inverse bit
Published 2011“…We compare our proposed algorithm with the 1-LSB algorithm and Lee’s algorithm using Peak signal-to-noise ratio (PSNR). …”
Get full text
Get full text
Article -
9
An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit
Published 2012“…We compare our proposed algorithm with the 1-LSB algorithm and Lee’s algorithm and Yang's algorithm using Peak signal�to-noise ratio (PSNR). …”
Get full text
Get full text
Get full text
Thesis -
10
Text searching algorithm using boyer moore horspool (BMH) algorithm
Published 2015“…The text searching is one of the famous technique uses to find data or text from the system for faster searching. …”
Get full text
Get full text
Undergraduates Project Papers -
11
-
12
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
13
An evolutionary harmony search algorithm with dominant point detection for recognition-based segmentation of online Arabic text recognition
Published 2014“…This paper highlights a novel strategy for online Arabic text recognition using a hybrid Genetic Algorithm (GA) and Harmony Search algorithm (HS). …”
Get full text
Get full text
Article -
14
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…Substitution cipher is a technique of encoding where units of plain text are replaced with cipher text and XOR operator is one of the encryption process used to make the cipher text harder to decryption. …”
Get full text
Get full text
Student Project -
15
Text categorization using naive bayes algorithm
Published 2006“…This algorithm has long been used for text categorization tasks. …”
Get full text
Get full text
Conference or Workshop Item -
16
Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali
Published 2019“…Our aim is to safely to transfer the file for using the AES algorithm. Proposed algorithm has done by analysing the different time taken for both AES and DES , experiment was done by three different file sizes and also file types, such as text, image and voice to test the encryption and decryption time taken on existing algorithm DES and proposed algorithm, in conclusion, all the results of our propose algorithm shows AES takes lesser time compare to DES. …”
Get full text
Get full text
Thesis -
17
Text Categorization Using Naive Bayes Algorithm
Published 2005“…This algorithm has long been used for text categorization tasks. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Jogging activity recognition using k-NN algorithm
Published 2022Get full text
Get full text
Get full text
Academic Exercise -
20
Task scheduling in cloud computing using hybrid genetic algorithm and bald eagle search (GA-BES)
Published 2022Get full text
Get full text
Get full text
Academic Exercise
