Search Results - (( java information data algorithm ) OR ( java implementation tree algorithm ))
Search alternatives:
- java implementation »
- implementation tree »
- java information »
- information data »
- data algorithm »
- tree algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
2
Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde
Published 2022“…Four conventional classification algorithms: naïve bayes (NB), support vector machines (SVM), nearest neighbor (k-NN), and decision trees (J48) classifiers are implemented in identifying and categorizing tweet data of three political figures in Malaysia: Dato Seri Anwar, Dato Hadi Awang, and Lim Guang Eng, as either positive, negative, or neutral perceptions. …”
Get full text
Get full text
Get full text
Thesis -
3
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
4
Hybrid cryptography algorithm to improve security cloud storage
Published 2017“…To improve secure of data in cloud storage by hybrid three algorithms (AES, ECC and RSA).All the existing algorithms has some sort of problems and issues, this had made us decide to develop a safe, correct ad efficient algorithm for having secured data in cloud storage. …”
Get full text
Get full text
Get full text
Thesis -
5
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…This study proposes a car parking management system which applies Dijkstra’s algorithm, Ant Colony Optimization (ACO) and Binary Search Tree (BST) in structuring a guidance system for indoor parking. …”
Get full text
Get full text
Thesis -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
7
Mapreduce algorithm for weather dataset
Published 2017“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Thesis -
8
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
9
MapReduce algorithm for weather dataset
Published 2018“…This original dataset is stored in Hadoop Distributed File System. Next, MapReduce Algorithm is developed using Java programming. The algorithm is tested using small and big dataset. …”
Get full text
Get full text
Research Report -
10
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
12
-
13
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. …”
Get full text
Get full text
Get full text
Article -
14
-
15
-
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
18
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…Capturing the tacit knowledge is not a straightforward task, since it consists of unstructured data and related to a variety of information that is not always accessible through traditional means. …”
Get full text
Get full text
Thesis -
19
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
20
