Search Results - (( java information systems algorithm ) OR ( basic computing mining algorithm ))
Search alternatives:
- systems algorithm »
- java information »
- computing mining »
- mining algorithm »
- basic computing »
-
1
Modifying iEclat algorithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
2
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
3
Web usage mining for UUM learning care using association rules
Published 2004Get full text
Get full text
Thesis -
4
-
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
Medical diagnosis using data mining techniques / Shaiful Nizam Zamri
Published 2003Get full text
Get full text
Thesis -
7
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
8
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
9
DSC766: Text Analytics / College of Computing, Informatics and Mathematics
Published 2020“…Student will learn the basic concepts, principles, and major algorithms in text mining and their potential applications.…”
Get full text
Get full text
Get full text
Teaching Resource -
10
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
11
-
12
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
13
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…This research opens a wide range of future work to be considered, which includes applying the proposed method in other areas such as web mining, text mining or multimedia mining; and extending the proposed approach to work in parallel computing in data mining.…”
Get full text
Get full text
Thesis -
14
Secure Image Steganography Using Encryption Algorithm
Published 2016Get full text
Get full text
Conference or Workshop Item -
15
Text messaging encryption system
Published 2012“…The only way to read the information is to know the method on how message is being masked,in this case knowing the algorithm used to encrypt the message. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Heavy Transportation Shortest Route using Dijkstra’s algorithm (HETRO) / Nurul Aqilah Ahmad Nezer
Published 2017“…The development tools used in developing this project is NetBeans by using Java for the implementation of the coding. The methodology that used for developing this system is the Dijkstra’s algorithm. …”
Get full text
Get full text
Thesis -
17
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
18
Text steganalysis using evolution algorithm approach
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
19
-
20
Songs Search Using Human Humming Voice
Published 2007Get full text
Get full text
Final Year Project
