Search Results - (( java application matching algorithm ) OR ( dramatic representation using algorithm ))
Search alternatives:
- application matching »
- representation using »
- java application »
- using algorithm »
-
1
-
2
Compact structure representation in discovering frequent patterns for association rules
Published 2002“…Frequent pattern mining is a key problem in important data mining applications, such as the discovery of association rules, strong rules and episodes. Structure used in typical algorithms for solving this problem operate in several database scans and a large number of candidate generation. …”
Get full text
Get full text
Get full text
Article -
3
Compact structure representation in discovering frequent patterns for association rules
Published 2002“…Frequent pattern mining is a key problem in important data mining applications, such as the discovery of association rules, strong rules and episodes. Structure used in typical algorithms for solving this problem operate in several database scans and a large number of candidate generation. …”
Get full text
Get full text
Get full text
Article -
4
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Consequently, The proposed caching scheme, Rough Cultural Algorithm (RCA) is developed to materialise the caching policies.…”
Get full text
Get full text
Article -
5
E-MyKad : An Online Identity Representation System for Malaysia’s Internet Community
Published 2013“…For many years, the online community in the world including Malaysia has increase dramatically. The people are using the internet mostly to interact and socialize with others and to do the online transactions such as selling and buying things. …”
Get full text
Get full text
Final Year Project -
6
-
7
-
8
Message based random variable length key encryption algorithm.
Published 2009Get full text
Get full text
Article -
9
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…The AES algorithm has its own structure to encrypt and decrypt sensitive data that make the attackers difficult to get the real data when encrypting by AES algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
-
11
An Agent-Based System with Personalization and Intelligent Assistance Services for Facilitating Knowledge Sharing
Published 2006“…The main algorithms used are profile determination and user similarity. …”
Get full text
Get full text
Thesis
