Search Results - (( java implication tree algorithm ) OR ( using table ((using algorithm) OR (mining algorithm)) ))
Search alternatives:
- java implication »
- implication tree »
- mining algorithm »
- using algorithm »
- tree algorithm »
- using table »
-
1
Mining least relational patterns from multi relational tables
Published 2005“…Results from the implementation reveal that the algorithm is capable of mining rare item in multi relational tables.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Data mining approach to herbs classification
Published 2018“…This research performs identification and classification of herbs based on image capture ad variety of classification algorithms such as an Artificial Neural Network (ANN), K-Nearest Neighbors (IBK), Decision Table (DT) and M5P Tree algorithms. …”
Get full text
Get full text
Get full text
Article -
3
Analysis of Feature Selection Methods for Sentiment Analysis Concerning Covid-19 Vaccination Issues
Published 2023“…In this study, the author will continue the research from another researcher by adding a feature selection process, such as two algorithms from the filtered method, chi-square, and information gain, and one algorithm from the wrapped method, which is Genetic Algorithms (GA). …”
Get full text
Get full text
Get full text
Article -
4
Feature and Instances Selection for Nearest Neighbor Classification via Cooperative PSO
Published 2014“…Therefore, it can be solved by using population-based techniques such as Genetic Algorithm and Particle Swarm Optimization. …”
Get full text
Get full text
Conference or Workshop Item -
5
Classification models for higher learning scholarship award decisions
Published 2018“…In this study, a data mining approach was used to propose a classification model of scholarship award result determination. …”
Get full text
Get full text
Get full text
Article -
6
Evolutionary-based feature construction with substitution for data summarization using DARA
Published 2012“…This approach allows initial features to be used more than once in constructing newly constructed features. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Protection of the digital holy Quran using SAB hash function
Published 2013Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
Published 2013“…In recent years, data mining approach for intrusion detection have been advised and used. …”
Get full text
Get full text
Get full text
Article -
9
Enhancement of {0, 1, 3}-NAF Recoding Algorithm using Block Method Technique for Elliptic Curve Cryptosystem
Published 2015“…The running time is used to measure the performance of the based and the proposed algorithm. …”
Get full text
Get full text
Thesis -
10
A faster version of Rijndael Cryptograpic algorithm using cyclic shift and bitwise operations
Published 2004“…This research proposes the use of cyclic shift and bit wise XOR operation as new approach to replace the lookup table. …”
Get full text
Get full text
Thesis -
11
Knowledge Discovery Of Noise Level In Lecture Rooms
Published 2018“…Data classification was conducted in two phases; initially on 23 built-in classifier algorithms followed by a refinement of seven better-performed classifiers with selective attributes investigation using Weka tool. …”
Get full text
Get full text
Monograph -
12
Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian
Published 2013“…In addition to the normal metrics, the computational time for executing each algorithm was also measured and compared. Our results show that algorithms which use elitism feature are superior to other algorithms in most of the metrics. …”
Get full text
Get full text
Thesis -
13
A faster version of rijndael cryptographic algorithm using cyclic shift and bit wise operations
Published 2009“…This research proposes the use of cyclic shift and bit wise XOR operation as new approach to replace the lookup table. …”
Get full text
Get full text
Article -
14
A lightweight and secure algorithm of elliptic curve cryptography scalar multiplication using Q-NAF method in Lopez-Dahab coordinate
Published 2019“…To conform to the application requirements of the IoT, the new algorithm improves w-NAF, where w=4. The proposed scalar recoding converts the binary scalar into {-1, 0, 1, 3, 5}-NAF using Q-NAF scalar recoding lookup table or a Q-NAF scalar recoding mathematical formula. …”
Get full text
Get full text
Thesis -
15
Performance of Ad-Hoc on-Demand Distance Vector Discovery Algorithms Based On Packet Lifetime
Published 2008“…The first algorithm focuses on the AODV route table update management. …”
Get full text
Get full text
Thesis -
16
A cylindrical coordinate system with dynamic permutation table for blowfish algorithm
Published 2014“…The combination of a DPT with a dynamic 3D S-box strengthens the resistance of the NBA against attacks and increases the randomness of the output.C++ is used in the implementation of both algorithms.The NIST tests are implemented under Linux.…”
Get full text
Get full text
Get full text
Article -
17
Design of nonlinear adaptive interaction algorithm controller for improvement of tracking performance of X-Y table ball screw drive system
Published 2023“…Secondly is to design a new control strategy that will provide good tracking performance of the XY table. The final objective is to validate the proposed technique through simulation using MATLAB/Simulink software and experimental work using real plant of Googoltech XY table. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A new image scrambling approach using block-based on shifted algorithm
Published 2013“…The second part of the algorithm uses the shifted table resulted from the first part of the algorithm to generate newly shifted image (Scrambled) in which the rows and the columns of the original image are shifted. …”
Get full text
Get full text
Get full text
Article -
19
Design and implementation of cordic algorithm with sinusoidal pulse width modulation switching strategy
Published 2017“…This design presents the uses of sinusoidal pulse width modulation (SPWM) as a switching control for multilevel inverter by using CORDIC algorithm. …”
Get full text
Get full text
Student Project -
20
