Search Results - (( java implementation models algorithm ) OR ( using access mining algorithm ))
Search alternatives:
- implementation models »
- java implementation »
- models algorithm »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
3
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
4
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
5
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…Client access patterns can be mined from web access log information using Web Usage Mining (WUM) techniques. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
8
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…Web usage mining algorithms have been widely utilized for modeling user web navigation behavior. …”
Get full text
Get full text
Article -
9
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…However, this is a step stone towards developing a biological-inspired Sentiment Mining algorithm…”
Get full text
Get full text
Thesis -
10
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
11
-
12
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
13
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
14
Comparison of Statistic Prediction Results in Weka Explorer Interface and Experimenter Environment Interface on Dataset
Published 2019“…Study confirm is to categorize data and help users mining useful data and easily identify an appropriate algorithm for an accurate predictive model, to access the best-performing algorithms, minimize errors and minimum time to build models through the Explorer interface and Experimental Environment Interface to get accurate.…”
Get full text
Get full text
Get full text
Article -
15
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
16
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…Currently, visual inspections for damage identification of structures are broadly used. However, they have two main drawbacks; time limitation and qualified manpower accessibility. …”
Get full text
Get full text
Article -
17
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
Development of a Web Access Control Technique Based User Access Behavior
Published 2004“…A set of algorithms is used for mining user access behavior, preprocessing tasks for data preparation, association rules for defining the rules that describe the correlation between web user access transaction entries patterns, and sequential pattern discovery for finding the sequences of the web user access transaction entries pattern using Prefixspan (Pattern growth via frequent sequence lattice) algorithms. …”
Get full text
Get full text
Thesis -
19
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
20
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018Get full text
Get full text
Article
