Search Results - (( process information sharing algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- process information »
- information sharing »
- application mining »
- sharing algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
-
8
Efficient usage strategy of limited shared memory in Graphical Processing Unit (GPU) for accelerate DNA sequence alignment / Ahmad Hasif Azman
Published 2023“…In this study, the focus is on utilizing the memory capabilities of GPUs to accelerate the Smith-Waterman algorithm has been proposed. Three new approaches based on global memory, shared memory and a combination of global and shared memory are used in this design. …”
Get full text
Get full text
Thesis -
9
-
10
Hybrid scheduling and dual queue scheduling
Published 2009Get full text
Get full text
Conference or Workshop Item -
11
-
12
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. Moreover, if the ineffective process requires re-examining the original tree, the efficiency of the process of the algorithm will be reduced. …”
Get full text
Get full text
Thesis -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
14
Hybrid scheduling and dual queue scheduling
Published 2009Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Effects of Different Superpixel Algorithms on Interactive Segmentations
Published 2022“…The said algorithm will be repetitively fed with such input information until required region of interest is successfully segmented. …”
Get full text
Get full text
Get full text
Article -
16
Social learning and principal-agent problems in profit sharing contract
Published 2023“…First, to theoretically examine the profit sharing (mudarabah) contract that produces an optimal distribution of return in the presence of social learning (shuratic process) within the environment of asymmetric information. …”
Article -
17
-
18
Effects of Different Superpixel Algorithms on Interactive Segmentations
Published 2022“…The said algorithm will be repetitively fed with such input information until required region of interest is successfully segmented. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Collaboration algorithms between intermediaries for supporting flexible supply chain management
Published 2013“…The authors introduce Integrative Information Management Architecture (IIMA) running on collaboration algorithms which create semi automated intermediary processes to support management team address integration challenges. …”
Get full text
Get full text
Get full text
Article -
20
Secure encryption in network using Data Encryption Standard (DES) for high security transmission
Published 2017“…The Data Encryption Standard (DES) algorithm is a symmetric key algorithm for the encryption of electronic and allowed for information. …”
Get full text
Get full text
Student Project
