Search Results - (( using computational mining algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- computational mining »
- mining algorithm »
- java application »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…An Intrusion Detection System is software or application which is used to detect thread, malicious activities and the unauthorized access to the computer system and warn the administrators by generating alarms. …”
Get full text
Get full text
Thesis -
2
Modifying iEclat algorithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
3
Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin
Published 2012“…However, this is a step stone towards developing a biological-inspired Sentiment Mining algorithm…”
Get full text
Get full text
Thesis -
4
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
5
Modifying iEclat algo ithm for infrequent patterns mining
Published 2018Get full text
Get full text
Conference or Workshop Item -
6
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
7
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…This study has indicated that data mining can be a useful tool in the medical field. …”
Get full text
Get full text
Get full text
Article -
8
Mining Of Resource Usage Using Evoc Algorithm In Grid Environment.
Published 2007Get full text
Get full text
Conference or Workshop Item -
9
Energy efficiency of the bitcoin mining hardware and related blockchain technology
Published 2018Get full text
Get full text
Get full text
Undergraduates Project Papers -
10
An efficient algorithm to discover large and frequent itemset in high dimensional data
Published 2019“…For this reason, this research has proposed two new algorithms; RARE and RARE II, which mine colossal closed itemsets. …”
Get full text
Get full text
Monograph -
11
First Semester Computer Science Students’ Academic Performances Analysis by Using Data Mining Classification Algorithms
Published 2014“…From the experiment, the models develop using Rule Based and Decision Tree algorithm shows the best result compared to the model develop from the Naïve Bayes algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Improved BVBUC algorithm to discover closed itemsets in long biological datasets
Published 2019“…Therefore, this paper proposed a method for computing closure compare with the method used in BVBUC algorithm method. …”
Get full text
Get full text
Get full text
Article -
13
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
14
Frequent Lexicographic Algorithm for Mining Association Rules
Published 2005“…Depth first strategy and vertical counting strategy are used in mining frequent patterns and computing the support of the patterns respectively. …”
Get full text
Get full text
Thesis -
15
-
16
Mining least relational patterns from multi relational tables
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
17
An Efficient Data Structure for General Tree-Like Framework in Mining Sequential Patterns Using MEMISP
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Frequent itemset mining in high dimensional data: a review
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
