Search Results - (( java implementation using algorithm ) OR ( user computing mining algorithm ))
Search alternatives:
- implementation using »
- java implementation »
- computing mining »
- mining algorithm »
- using algorithm »
- user computing »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…These data are processed and stored in appropriate formats in a MySQL server database. Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. While a rather simplistic and dated algorithm, it remains widely used and taught till this day. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
-
4
-
5
Paper Survey And Example Of Collaborative Filtering Implementation In Recommender System
Published 2017“…Further research can provide newer algorithm to handle cold start problem and sparse data from both text mining and mining computation perspectives.…”
Get full text
Get full text
Get full text
Article -
6
-
7
-
8
Energy efficiency of the bitcoin mining hardware and related blockchain technology
Published 2018Get full text
Get full text
Get full text
Undergraduates Project Papers -
9
-
10
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
11
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…Depth first strategy and vertical counting strategy are used in mining frequent patterns and computing the support of the patterns respectively. …”
Get full text
Get full text
Thesis -
12
-
13
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
14
-
15
Web usage mining for UUM learning care using association rules
Published 2004Get full text
Get full text
Thesis -
16
-
17
-
18
-
19
-
20
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph
