Search Results - (( java application mining algorithm ) OR ( image implementation level algorithm ))
Search alternatives:
- image implementation »
- implementation level »
- application mining »
- java application »
- mining algorithm »
- level algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
IMPLEMENTATION OF IMAGE TEXTURE ANALYSIS USING GRAY LEVEL RUN LENGTH APPROACH
Published 2006“…The objective of this project is to develop algorithms inMATLAB and be able to implement image texture analysis by using the developed algorithms. …”
Get full text
Get full text
Final Year Project -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…The algorithm was mainly inspired by spatial pyramid pooling in generic image classification combined with PCA. …”
Get full text
Get full text
Thesis -
9
Contrast enhancement for colour images based on discrete wavelet transform
Published 2017“…However, the contrast enhancement algorithm normally challenging to fulfil the desired results so the image processing is executed manually for each specified images. …”
Get full text
Get full text
Student Project -
10
A new image scrambling technique using block rotation algorithm based on Rubik’s cube
Published 2013“…The relationship among the adjacent pixels of image is very high. Also, Most image scrambling algorithms apply one iteration level scrambling that cause a high possibility of occurs the weakness of visual leakage on the image scrambling algorithm which can be reflected by the corresponding scrambled image. …”
Get full text
Get full text
Get full text
Article -
11
A new image scrambling approach using block-based on shifted algorithm
Published 2013“…This makes the scrambled images difficult to decode thus providing a high level of security protection for the images. …”
Get full text
Get full text
Get full text
Article -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
13
-
14
Implementation of Parallel K-Means Algorithm to Estimate Adhesion Failure in Warm Mix Asphalt
Published 2020“…To attain high accuracy from image processing algorithms, the loss of pixels plays an essential role. …”
Get full text
Get full text
Article -
15
A New Approach in a Gray-Level Image Contrast Enhancement by using Fuzzy Logic Technique
Published 2015“…By using Matlab was implemented the algorithm, and applied to difference gray level images such as old documents images, biomedical images, most of them gives very good results especially with the biomedical images, because of its significant impact on the adjustment of lighting in dark images, clarify its edges, clarify their features and improved image quality.…”
Get full text
Get full text
Get full text
Article -
16
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Traditional methods of fingerprint verification uses either complicated feature detection algorithms that are not specific to each fingerprint, or compare two fingerprint images directly using image processing toots. …”
Get full text
Get full text
Thesis -
17
Denoising of digital images using second generation wavelet transforms-hidden markov model
Published 2016“…In order to increase the robustness of the proposed algorithm, the level of noise in digital image can be estimated if the noise standard deviation σ is unknown. …”
Get full text
Get full text
Thesis -
18
Image encryption and decryption using 3D-AES block cipher algorithm / Engku Maryam Syahdina Engku Safruddin
Published 2018“…The aim of this study were to conduct a research on how to identify the implementation of security analysis of image using 3D-AES block cipher algorithm. …”
Get full text
Get full text
Thesis -
19
Formulation of hybrid 3D image segmentation algorithm based partial differential equation
Published 2012Get full text
Get full text
Get full text
Proceeding Paper -
20
BinDCT Design and Implementation on FPGA with Low Power Architecture
Published 2008“…As Discrete Cosine Transform (DCT) is dominant in many international standards for image/video and audio compression, the introduction of multiplierless algorithm for fast DCT computation known as BinDCT (Binary DCT) is very well suited for VLSI implementation. …”
Get full text
Get full text
Thesis
