Search Results - (( java implementation using algorithm ) OR ( pattern mining three algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- using algorithm »
- three algorithm »
- pattern mining »
- mining three »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. The image clustering is major part of data mining where study about how to binds the similar data together in a cluster and show the meaningful data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
3
DFP-growth: An efficient algorithm for mining frequent patterns in dynamic database
Published 2012“…Nowadays, FP-Growth is one of the famous and benchmarked algorithms to mine the frequent patterns from FP-Tree data structure. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…The mined frequent patterns are then used in generating association rules. …”
Get full text
Get full text
Thesis -
5
IncSPADE: An Incremental Sequential Pattern Mining Algorithm Based on SPADE Property
Published 2016“…In this paper we propose Incremental Sequential PAttern Discovery using Equivalence classes (IncSPADE) algorithm to mine the dynamic database without the requirement of re-scanning the database again. …”
Get full text
Get full text
Get full text
Book Chapter -
6
ELP-M2: An Efficient Model for Mining Least Patterns from Data Repository
Published 2017Get full text
Get full text
Get full text
Get full text
Book Chapter -
7
Web usage mining for UUM learning care using association rules
Published 2004“…Web usage mining consists of three main phases, namely Data Preprocessing, Pattern Discovering and Pattern Analysis. …”
Get full text
Get full text
Thesis -
8
Web Usage Mining Using GSP Algorithm: A Study on Sultanah Bahiyah Library Online Databases
Published 2008“…In this study web usage mining use sequential pattern technique with GSP algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
-
10
Web Usage Mining for UUM Learning Care Using Association Rules
Published 2004“…In order to produce the university E-Learning (UUM Educare) portal usage patterns and user behaviors, this paper implements the high level process of Web usage mining using basic Association Rules algorithm - Apriori Algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
12
MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM
Published 2011“…In this paper we proposed an algorithm for mining patterns of huge stock data to predict factors affecting the sale of products. …”
Get full text
Get full text
Citation Index Journal -
13
MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM
Published 2011“…In this paper we proposed an algorithm for mining patterns of huge stock data to predict factors affecting the sale of products. …”
Get full text
Get full text
Citation Index Journal -
14
EFP-M2: Efficient model for mining frequent patterns in transactional database
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Sequential pattern mining on library transaction data
Published 2010“…This paper presents results of the work in applying the sequential pattern mining algorithm namely AprioriAll on a library transaction dataset. …”
Get full text
Get full text
Conference or Workshop Item -
16
Mining dense data: Association rule discovery on benchmark case study
Published 2016“…Data Mining (DM), is the process of discovering knowledge and previously unknown pattern from large amount of data. …”
Get full text
Article -
17
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
18
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
19
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
20
