Search Results - (( java application mining algorithm ) OR ( data ((application a) OR (application _)) algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- application a »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm requires two inputs for it to be applied onto a data set, the value K, and a proximity measure. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
-
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…Eventually, the workflow is executed. The second algorithm is a variation in first algorithm in which data parallelism is introduced in each partition. …”
Get full text
Get full text
Get full text
Thesis -
9
Development of decentralized data fusion algorithm with optimized kalman filter.
Published 2016“…In all the applications, various data fusion algorithms such as Kalman filter algorithm, factor analysis (FA) algorithm and the proposed QR-FA algorithm are compared on basis of estimation error. …”
Get full text
Get full text
Thesis -
10
Development of heuristic task scheduling algorithm in cloud computing
Published 2016“…To this direction, in this paper we make a summary of some scheduling algorithms and propose an Enhanced Greedy Heuristic Scheduling Algorithm (EGHSA) for task scheduling adapted for big data applications. …”
Get full text
Get full text
Proceeding Paper -
11
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
12
Application of the bees algorithm to the selection features for manufacturing data
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
13
On density-based data streams clustering algorithms: A survey
Published 2017“…Recently, a lot of density-based clustering algorithms are extended for data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Data discovery algorithm for scientific data grid environment
Published 2005“…In a distributed P2P system, a discovery algorithm is required to locate specific information, applications, or users within the system. …”
Get full text
Get full text
Get full text
Article -
15
Fatigue data editing algorithm for automotive applications
Published 2005“…The accuracy of the algorithm has been evaluated by application to two experimentally measured data sets containing tensile and compressive preloading conditions. …”
Get full text
Get full text
Article -
16
Improved genetic algorithm for scheduling divisible data grid application
Published 2007“…In this paper, we exploit this property and propose an Improved Genetic Algorithm (IGA) for scheduling divisible data grid applications. …”
Get full text
Get full text
Conference or Workshop Item -
17
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…It is aimed for general security applications such as finding (the confidentiality level of the data when the algorithm is trained with multiple training categories during the data classification phase. …”
Get full text
Get full text
Article -
18
Semantic-k-NN algorithm: An enhanced version of traditional k-NN algorithm
Published 2020“…It is aimed for general security applications such as finding (the confidentiality level of the data when the algorithm is trained with multiple training categories during the data classification phase. …”
Get full text
Get full text
Article -
19
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…This is due to the cryptography operations that include the HMAC and symmetric encryptions. The thesis proposes a new algorithm that provides a significant performance gain in bulk data transfer without compromising the security. …”
Get full text
Get full text
Thesis -
20
A study of density-grid based clustering algorithms on data streams
Published 2011Get full text
Get full text
Conference or Workshop Item
