Search Results - (( java application mining algorithm ) OR ( data certification process algorithm ))
Search alternatives:
- application mining »
- data certification »
- process algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
User-Device Authentication Model With Digital Certificate For Smartphone User
Published 2024thesis::master thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
9
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The security level for documents is necessary since a lot of formal procedures and processes nowadays need digital documents as proof or process verification, such as internet banking receipts, official letters of appointment, academic transcripts and certificates, scanned documents, and commercial documents for online marketing. …”
Get full text
Get full text
Thesis -
10
Classification and visualization on eligibility rate of applicant’s LinkedIn account using Naïve Bayes / Nurul Atirah Ahmad
Published 2023“…The collected data from LinkedIn profiles then undergoes data preprocessing. …”
Get full text
Get full text
Thesis -
11
-
12
Reliable access control for mobile cloud computing (MCC) with cache-aware scheduling
Published 2019“…In mobile cloud computing (MCC), data are stored and processed by more powerful computing platforms located in clouds to enhance the capability of mobile devices. …”
Get full text
Get full text
Get full text
Article -
13
Employing Public Key Infrastructure to Encapsulate Messages During Transport Layer Security Handshake Procedure
Published 2022“…—The Transport Layer ensures that data is sent transparently between end-users while also enabling reliable data transfer services to the higher levels. …”
Get full text
Get full text
Get full text
Proceeding -
14
An investigation into influence factor of student programming grade using association rule mining
Published 2010“…The dataset consisting of 4 19 records with 70 attributes were pre-processed and then mined using directed association rule mining algorithm namely Apriori. …”
Get full text
Get full text
Get full text
Article -
15
Secure multi-authority attribute-based encryption access control with cache-aware scheduling in mobile cloud computing
Published 2021“…However, some challenges are still outstanding due to the complexity of frequently changing the cryptographic enforcements of the owners’ access policies in the hosted cloud data files, and the key issuing process which poses computational and communicational overheads to data owners. …”
Get full text
Get full text
Thesis
