Search Results - parallel operation ((using algorithm) OR (mining algorithm))*
Search alternatives:
- mining algorithm »
- using algorithm »
-
1
Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining.
Published 2005“…This research has proven that the TIP method has shown the ability to cater for different kinds of datasets and obtained a good rough classification model with promising results as compared with other commonly used classifiers. This research opens a wide range of future work to be considered, which includes applying the proposed method in other areas such as web mining, text mining or multimedia mining; and extending the proposed approach to work in parallel computing in data mining.…”
Get full text
Get full text
Thesis -
2
Enhancing performance of XTS cryptography mode of operation using parallel design
Published 2009“…In addition, the parallel XTS mode was also simulated using Twofish and RC6 encryption algorithms. …”
Get full text
Get full text
Thesis -
3
A parallel XTS encryption mode of operation
Published 2009“…In this paper, the newly standardized IEEE XTS encryption mode of operation for storage encryption (P1619 standard) has been implemented using parallel design. …”
Get full text
Get full text
Conference or Workshop Item -
4
Implementation of a parallel XTS encryption mode of operation
Published 2014“…In this paper, the IEEE XTS encryption mode of operation for storage encryption (P1619 standard) has been implemented using parallel design. …”
Get full text
Get full text
Get full text
Article -
5
Parallel matrix-multiplication algorithm on network of workstations
Published 2004“…We discuss matrix-multiplication algorithm and highlight one of the parallel matrix--multiplication algorithms. …”
Get full text
Get full text
Get full text
Article -
6
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current sequential algorithm. …”
Get full text
Get full text
Thesis -
7
K Nearest Neighbor Joins And Mapreduce Process Enforcement For The Cluster Of Data Sets In Bigdata
Published 2018“…K Nearest Neighbor Joins (KNN join) are regarded as highly primitive and expensive operations in the data mining.The efficient use of KNN join has proven good results in finding the objects from two data sets prevailed in the huge databases.This has been achieved with the combination of K-Nearest Neighbor query and join operation to find the distinct objects from different data sets.MapReduce is a newly introduced program with the combination of Map Procedure method and Reduce Method widely used in BigData.MapReduce is enriched with parallel distributed algorithm to find the results on a cluster of data sets in BigData.In this paper,the combination of KNN join and MapReduce methods are utilized on the cluster of data sets in BigData for knowledge discovery.Exploring the pinpoint data from huge data sets stored in Big Data demands the distributed large scale data processing.The present research paper is focusing on generic steps for KNN joins exploration operations on MapReduce.The operations of KNN Join are targeted to perform the data partitioning and data pre-processing and necessary calculations.By utilizing the combination of KNN joins with MapReduce methods on BigData data sets will demonstrate a solution for complex computational analysis. …”
Get full text
Get full text
Get full text
Article -
8
Parallelization of noise reduction algorithm for seismic data on a beowulf cluster
Published 2010“…The parallel algorithm was developed using C language with the utilization of the Message Passing Interface (MPI) library. …”
Get full text
Get full text
Citation Index Journal -
9
Enhancing security performance with parallel crypto operations in SSL bulk data transfer phase
Published 2007“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the current (sequential) algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
10
Improving security performance with parallel crypto operations in SSL bulk data transfer
Published 2009“…Based on the performance simulations, the new parallel algorithm gained speedup of 1.74 with 85% efficiency over the sequential (current) algorithm.…”
Get full text
Get full text
Get full text
Article -
11
A review of genetic algorithms and parallel genetic algorithms on Graphics Processing Unit (GPU)
Published 2013“…One of the popular ways to speed up the processing time was by running them as parallel. The idea of parallel GAs may refer to an algorithm that works by dividing large problem into smaller tasks. …”
Get full text
Conference or Workshop Item -
12
Parallel algorithms for numerical simulations of EHD ion-drag micropump on distributed parallel computing systems
Published 2014“…To implement the parallel algorithms a distributed parallel computing laboratory using easily available low cost computers is setup. …”
Get full text
Get full text
Thesis -
13
Parallelization Of CCSDS Hyperspectral Image Compression Using C++
Published 2018“…However, CCSDS-MHC has the potential to operate on multi-core system with the use of parallelization. …”
Get full text
Get full text
Monograph -
14
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…Additionally, the MTS algorithm is also implemented in parallel computing to produce parallel MTS for generating comparable solutions in shorter computational times. …”
Get full text
Get full text
Thesis -
15
Parallel block backward differentiation formulas for solving ordinary differential equations.
Published 2008“…Numerical results are given to compare the speedup and efficiency of parallel algorithm and that of sequential algorithm.…”
Get full text
Article -
16
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…In this paper, we propose a parallel implementation technique using Chinese Remainder Theorem and thread on encryption and decryption operation in RSA when files are to be encrypted and decrypted. …”
Get full text
Get full text
Get full text
Article -
17
Parallel computation of maass cusp forms using mathematica
Published 2013“…Our parallel programme comprises of two important parts namely the pullback algorithm and also the Maass cusp form algorithm. …”
Get full text
Get full text
Thesis -
18
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
Published 2012“…Moreover, projective coordinates were used to apply ECC operations to eliminate the time-consuming inversion operation. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Parallelizing GF (p) montgomery elliptic curve crypto-system operations to improve security and performance.
Published 2013“…Moreover, projective coordinates were used to apply ECC operations to eliminate the time-consuming inversion operation. …”
Get full text
Get full text
Book Section -
20
Voting algorithms for large scale fault-tolerant systems
Published 2011“…To solve this problem and gain benefits of this algorithm, we employed parallel algorithm technique and by using optimal number of processors, we could propose optimal algorithms known as Parallel Average Voting and Parallel Weighted Average Voting which both have optimal time complexity and less calculation cost. …”
Get full text
Get full text
Thesis
