Search Results - data application ((using algorithm) OR (using algorithmic))
Search alternatives:
- data application »
- using algorithm »
- algorithmic »
-
1
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…Exploring the dataset features through the application of clustering algorithms is a viable means by which the conceptual description of such data can be revealed for better understanding, grouping and decision making. …”
Get full text
Get full text
Get full text
Article -
2
Enhancing Secure Sockets Layer Bulk Data Trnsfer Phase Performance With Parallel Cryptography Algorithm
Published 2007“…The proposed algorithm performs the encryption of the data and the calculation of the MAC in parallel. …”
Get full text
Get full text
Thesis -
3
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…To avoid such overheads many techniques have been used, however in this thesis stream-based data processing model is used in which data is processed in the form of continuous instances of data items. …”
Get full text
Get full text
Get full text
Thesis -
4
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
5
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
6
-
7
-
8
An extended ID3 decision tree algorithm for spatial data
Published 2011Get full text
Get full text
Conference or Workshop Item -
9
-
10
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…There are many researchers used Data Encryption Standard (DES) Algorithm to implement in FPGAs. …”
Get full text
Get full text
Monograph -
11
-
12
Two objectives big data task scheduling using swarm intelligence in cloud computing
Published 2016“…The proposed method is evaluated using CloudSim and big data applications are used as sample of applications. …”
Get full text
Get full text
Get full text
Article -
13
Development of heuristic task scheduling algorithm in cloud computing
Published 2016“…As the immense growth of data have affected many organizations, there have been a need to adopt the cloud resources for processing big data applications which could cost highly by using traditional storage. …”
Get full text
Get full text
Proceeding Paper -
14
AntNet: a robust routing algorithm for data networks
Published 2004Get full text
Get full text
Get full text
Article -
15
Modified Data Encryption Standard Algorithm for Textbased Applications
Published 2006“…Because of its short time execution and higher authentication, using this algorithm will ensure the security for internet applications.…”
Get full text
Get full text
Thesis -
16
An Alternative Algorithm for Soft Set Parameter Selection using Special Order
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Data discovery algorithm for scientific data grid environment
Published 2005“…By using this model, we study various discovery algorithms for locating data sets in a data grid system. …”
Get full text
Get full text
Get full text
Article -
18
Spatial Clustering Algorithm for Time Series Rainfall Data Using X-Means Data Splitting
Published 2017“…Therefore, a clustering algorithm by introducing data transformation using X-means data splitting is proposed to investigate the spatial homogeneity of time series rainfall data. …”
Get full text
Get full text
Get full text
Article -
19
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. While a rather simplistic and dated algorithm, it remains widely used and taught till this day. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Melanoma skin cancer recognition using negative selection algorithm / Muhammad Rushamir Hakimi Ruslan
Published 2017“…The Negative Selection Algorithm has been successfully applied in several application areas such as fault detection, virus detection and data integrity protection. …”
Get full text
Get full text
Thesis
