Search Results - (( java implication based algorithm ) OR ( using store study algorithm ))
Search alternatives:
- implication based »
- java implication »
- using store »
- store study »
-
1
Restock management system by using market basket analysis / Nazrin Adnan
Published 2016“…This study is focus on Market Basket Analysis which is analyze the customer purchase behavior from previous purchases by using apriori algorithm. …”
Get full text
Get full text
Thesis -
2
-
3
Cryptographic Algorithm Using Matrix Inversion as Data Protection
Published 2011Get full text
Get full text
Get full text
Article -
4
A Study Of Salting Method for Image Protection
Published 2013“…The general purpose of using this method is mainly because it provides the best type of security towards images, by implementing the method on the passwords used to gain access to the image stored in the database. …”
Other -
5
Classification of Google Play application using decision tree algorithm on sentiment analysis of text reviews / Aqil Khairy Hamsani, Ummu Fatihah Mohd Bahrin and Wan Dorishah Wan A...
Published 2023“…The study begins with a comprehensive background, examining the significance of classifying Google Play Store applications using user reviews. …”
Get full text
Get full text
Get full text
Article -
6
Expanding the data capacity of QR codes using multiple compression algorithms and base64 encode/decode
Published 2017“…One of the technique to increase data capacity is by compressing the data and encode it with a suitable data encoder. This study focuses on the selection of compression algorithms and use base64 encoder/decoder to increase the capacity of data which is to be stored in the QR code. …”
Get full text
Get full text
Get full text
Article -
7
Data Analysis and Rating Prediction on Google Play Store Using Data-Mining Techniques
Published 2022“…This study aims to predict the ratings of Google Play Store apps using decision trees for classification in machine learning algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Exploratory analysis with association rule mining algorithms in the retail industry / Alaa Amin Hashad ... [et al.]
Published 2024“…The study used a retail store dataset consisting of 522,064 rows and 7 variables. …”
Get full text
Get full text
Article -
9
Chaotic-based encryption algorithm using henon and logistic maps for fingerprint template protection
Published 2020“…Hence, this study aims to improve the limitations found in the existing chaotic-based encryption algorithms for FTP by improving its encryption speed using Henon and Logistic map. …”
Get full text
Get full text
Get full text
Article -
10
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Thesis -
11
Increasing data storage of coloured QR code using CoMMT technique
Published 2020“…Quick Response (QR) Code is a printed code of black and white squares that is able to store data without the use of any of the electronic devices. …”
Get full text
Get full text
Article -
12
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item -
13
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Get full text
Thesis -
14
Prediction of payment method in convenience stores using machine learning
Published 2023Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Genetic algorithm based mass distribution optimization of quadruped leg robot for walking performance enhancement
Published 2013“…Genetic algorithm is used to search for the optimal mass distribution that carried out the farthest walking distance on various terrains. …”
Get full text
Get full text
Thesis -
16
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper -
17
A comparative review on symmetric and asymmetric dna-based cryptography
Published 2023“…Current researchers have focused on DNA-based cryptography, in fact, DNA or deoxyribonucleic acid, has been applied in cryptography for performing computation as well as storing and transmitting information. In the present work, we made use of DNA in cryptographic, i.e. its storing capabilities (superior information density) and parallelism, in order to improve other classical cryptographic algorithms. …”
Article -
18
An ensemble data summarization approach based on feature transformation to learning relational data
Published 2015“…The Information Gain borrowed from Information Retrieval theory and Term-term Correlation algorithm are used to determine the relevancy of these features to be selected or merged in order to form a new generation of TF-IDF vector space. …”
Get full text
Get full text
Get full text
Thesis -
19
Optimized feature construction methods for data summarizations of relational data
Published 2014“…Dynamic Aggregation of Relational Attributes (DARA) algorithm is one of the approaches to summarize data stored in a target table that has a one-to-many relationship with data stored in a non-target table. …”
Get full text
Get full text
Get full text
Thesis -
20
Proposed system for data security in distributed computing in using triple data encryption standard and Rivest Shamir Adlemen
Published 2023“…In this paper, a comparative study is done between the two security algorithms on a cloud platform called eyeOS. …”
Article
