Search Results - (( data transformation needs algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- transformation needs »
- data transformation »
- application mining »
- java application »
- mining algorithm »
- needs algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Data mining techniques for transformer failure prediction model: A systematic literature review
Published 2023Conference Paper -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
Automated time series forecasting
Published 2011“…Good planning and controlling procedure would lead to successful business.There are two categories of forecasting techniques; namely qualitative and quantitative.Qualitative technique is more towards judgmental forecasting and usually used when data is limited. While quantitative technique is based on statistical concepts and requires large amount of data in order to formulate the mathematical models.This technique can be classified into projective and causal technique.The projective technique (or univariate modelling) just involve one variable while the causal technique (or econometric modelling) suitable for multi-variables.Since forecasting involves uncertainty, several methods need to be executed on one set of time series data in order to produce accurate forecast.Hence, usually in practice forecaster need to use several softwares to obtain the forecast values.If this practice can be transformed into algorithm (well-defined rules for solving a problem) and then the algorithm can be transformed into a computer program, less time will be needed to compute the forecast values where in business world time is money.In this study, we focused on algorithm development for univariate forecasting techniques only and will expand towards econometric modelling in the future.Two set of simulated data (yearly and non-yearly) and several univariate forecasting techniques (i.e. …”
Get full text
Get full text
Get full text
Monograph -
10
Statistical analysis, ciphertext only attack, improvement of generic quasigroup string transformation and dynamic string transformation
Published 2018“…Algebraic functions are the primitives that strengthen the cryptographic algorithms to ensure confidentiality of data and information. …”
Get full text
Get full text
Article -
11
Enhancement of most significant bit (MSB) algorithm using discrete cosine transform (DCT) in non-blind watermarking / Halimah Tun Abdullah
Published 2014“…This is because many attackers attempt to retrieve the secret data from an image than audio and video. The algorithm and techniques that implemented in this project is Most Significant Bit (MSB) algorithm and Discrete Cosine Transform (OCT) as a technique for embedding process. …”
Get full text
Get full text
Thesis -
12
Application of Mellin-Kamal transformation in EL Gamal Ciphertext Cryptosystem / Nurul Syazwani Husairi and Nurul Aqilah Mohd Fauzi
Published 2023“…El Gamal ciphertext cryptosystem is one of the fluently used algorithms to satisfy the security message or data transmission. …”
Get full text
Get full text
Student Project -
13
Thresholding and quantization algorithms for image compression techniques : a review
Published 2018“…Recently, there is a growing interest among researchers focusing on compression of various types of images and data. Amongst various compression algorithms, transform-based compression is one of the promising algorithms. …”
Get full text
Get full text
Get full text
Article -
14
Thresholding and quantization algorithms for image compression techniques: a review
Published 2018“…Recently, there is a growing interest among researchers focusing on compression of various types of images and data. Amongst various compression algorithms, transform-based compression is one of the promising algorithms. …”
Get full text
Get full text
Article -
15
Design and implementation of real data fast fourier transform processor on field programmable gates array
Published 2015“…The Fast Fourier Transform (FFT) is an efficient method to achieve the Discrete Fourier Transform (DFT) with less number of operations. …”
Get full text
Get full text
Thesis -
16
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
17
Using genetic algorithms as image watermarking performance optimizer / Zuhaili Zahid
Published 2008“…Image watermarking is a method to hide a message in an image for transmission of secret data or identification purposes. The data will be embedded into the image digitally and whenever needed will be retrieved out of that image. …”
Get full text
Get full text
Thesis -
18
Modified algorithm for image watermarking using 2D-DCT and elgamal cryptosystem / Nur Azien Yazid, Kamilah Abdullah and Suhaila Abd Halim
Published 2019“…The cryptosystem is combined with existing Arnold transform in watermarking algorithm to enhance the security of secret image. …”
Get full text
Get full text
Get full text
Article -
19
An ensemble data summarization approach based on feature transformation to learning relational data
Published 2015“…In the process of summarizing data, the data stored in multi-relational database need to be transformed into Term Frequency - Inverse Document Frequency (TF-IDF) vector space. …”
Get full text
Get full text
Get full text
Thesis -
20
A block cipher based on genetic algorithm
Published 2016“…To satisfy the information security requirements and to enhance the information security, we need secured communication and data which can be attained by encrypting the data. …”
Get full text
Get full text
Get full text
Thesis
