Search Results - (( java application mining algorithm ) OR ( system implementation level algorithm ))
Search alternatives:
- system implementation »
- implementation level »
- application mining »
- java application »
- mining algorithm »
- level algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014Get full text
Get full text
Undergraduates Project Papers -
9
Process Planning Optimization In Reconfigurable Manufacturing Systems
Published 2008“…On the other hand, the superior performance of the genetic algorithm that implements an extended diversity control mechanism demonstrates that more competent genetic algorithms can be designed through customized operators. …”
Get full text
Get full text
Thesis -
10
The Development Of System For Algorithms Visualization Using Simjava
Published 2020“…The purpose of this study is to design a system for sorting algorithm visualization and implement the system.…”
Get full text
Get full text
Get full text
Article -
11
Implementation if PID controller for controlling the liquid level of the coupled tank system
Published 2009“…This project presents the PID controller design for controlling liquid level of coupled tank system. These coupled tank liquid level systems are in second order system. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Implementation of PID controller for controlling the liquid level of the coupled tank system
Published 2008“…This project presents the PID controller design for controlling liquid level of coupled tank system. These coupled tank liquid level systems are in second order system. …”
Get full text
Get full text
Undergraduates Project Papers -
13
A modified H-bridge multilevel inverter for photovoltaic system
Published 2010“…The proposed system was implemented in a prototype.…”
Get full text
Article -
14
Optimal vehicle to grid planning and scheduling using double layer multi-objective algorithm
Published 2023Article -
15
-
16
-
17
-
18
Register Transfer Level Implementation Of Pooling - Based Feature Extraction For Finger Vein Identification
Published 2017“…The proposed algorithm was implemented on hardware using Verilog-HDL, and targeting Field Programmable Gate Array (FPGA) applications. …”
Get full text
Get full text
Thesis -
19
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…Four levels of analysis are traversed in order of decreasing abstraction: computational, algorithmic, implementational and formational. …”
Get full text
Get full text
Thesis -
20
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
Published 2004“…Performance has always been the most critical characteristic of a cryptographic algorithm, which determines its effectiveness. In this research the most popular and used algorithm, which is RSA, is implemented with a new modification in order to reduce the calculation time of the algorithm. …”
Get full text
Get full text
Thesis
