Search Results for "apriori algorithm in java" - Page 9

Showing 592 open source projects for "apriori algorithm in java"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Deliver secure remote access with OpenVPN. Icon
    Deliver secure remote access with OpenVPN.

    Trusted by nearly 20,000 customers worldwide, and all major cloud providers.

    OpenVPN's products provide scalable, secure remote access — giving complete freedom to your employees to work outside the office while securely accessing SaaS, the internet, and company resources.
    Get started — no credit card required.
  • 1
    Java application for training and deploying text processing applications such as part-of-speech taggers, based on a re-implementation of Brill's algorithm in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 2
    totp-me

    totp-me

    TOTP authenticator for Java ME

    Not only a Google authenticator for 2-step verification for Java ME enabled phones. This is MIDlet-1.0 implementation of RFC 6238 authenticator - TOTP: Time-Based One-Time Password Algorithm. It's quick, simple and it supports multiple profiles.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 3

    Damerau Levenshtein

    Java Library for Damerau Levenshtein Algorithm

    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Java generic Iterator implementation to generate permutations and combinations. Uses the algorithm described here http://en.wikipedia.org/wiki/Steinhaus%E2%80%93Johnson%E2%80%93Trotter_algorithm#Even.27s_speedup and the clear description of that algorithm here: http://www.cut-the-knot.org/Curriculum/Combinatorics/JohnsonTrotter.shtml
    Downloads: 0 This Week
    Last Update:
    See Project
  • Powering the best of the internet | Fastly Icon
    Powering the best of the internet | Fastly

    Fastly's edge cloud platform delivers faster, safer, and more scalable sites and apps to customers.

    Ensure your websites, applications and services can effortlessly handle the demands of your users with Fastly. Fastly’s portfolio is designed to be highly performant, personalized and secure while seamlessly scaling to support your growth.
    Try for free
  • 5

    Face Recognition Based Login Assistant

    Login to Websites Automatically Using Your Face as Password

    ... in to user accounts. The Viola - Jones Algorithm presents a novel face detection technique, we would implement this technique for face detection and then use eigen faces method to recognize the person in the image. Once recognized the person can easily sign in to any applications without the need of typing passwords or usernames.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    The Java RTree project aims to maintain an Java version of the RTree spatial indexing algorithm. See http://jsi.sourceforge.net for more information, and http://github.com/aled/jsi for latest development code.
    Leader badge
    Downloads: 330 This Week
    Last Update:
    See Project
  • 7

    Mjolnir

    Java code for brute forcing keystore certificates

    Mjölnir is a a java-based brute force algorithm for obtaining keystore passwords by brute force. It is multi-threaded
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    Approximate Subgraph Matching Algorithm

    Approximate Subgraph Matching Algorithm for Dependency Graphs

    ..., the total worst-case algorithm complexity is O(m^n * n(n-1)/2 * km * log m). This Java implementation implements our ASM algorithm. See README file: https://sourceforge.net/projects/asmalgorithm/files/ If you use our ASM implementation to support academic research, please cite the following paper: Haibin Liu, Lawrence Hunter, Vlado Keselj, and Karin Verspoor. Approximate Subgraph Matching-based Literature Mining for Biomedical Events and Relations. PLOS ONE, 8:4 e60954, 2013.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9

    java quickShort

    quick short in java

    This simple shorting large data from file using quickshort algorithm
    Downloads: 0 This Week
    Last Update:
    See Project
  • Build Securely on Azure with Proven Frameworks Icon
    Build Securely on Azure with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 10

    Low latency trading platform

    The documents for my achievements of the low latency technology

    Ultra-low latency trading platform MFC/Socket/Nios II/UcOS/FPGA Float Algorithm/Martlab/Simple FIX protocal FPGA Moving Average algorithm and performance evaluation with Marlab result. Fast response in the stock market Flash Crush situation. Stock exchange client Java RCP/Apache_Active_MQ/Plugins/QuickFIX/SLF4J/XstreamApache_LOG4J To see how the software trading client work. Through this way, I made deep understanding to how we can reduce the trading latency based on FPGA technology...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11

    VIM cloud

    Web Based IaaS Cloud Controller (VimCloud)

    This is a pure IaaS cloud controller with all the basic functionality of IaaS Cloud Controller. This uses proposed “Trust Based Scheduling Algorithm and Load Balancing Algorithm”. It uses Cloud Architecture with Trust Management layer. It uses Qemu machine emulator and virtualizer as virtualization software at Host. It uses Libvirt driver [30] to interact with Qemu and to interact with its virtualization capabilities of a range of operating systems. Libvirt provides a common, generic and stable...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    NeSSi2

    NeSSi2

    Network security simulator

    At the moment NeSSi² is not actively maintained anymore since we are planning a successor project. NeSSi² is a network simulation tool suite addressing in particular network security aspects. Sample capabilities are profile-based attack generation, traffic analysis and support for attack/malware detection algorithm plugins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 13

    Reactor Breeder

    A Genetic Algorithm for Reactors in StarMade

    This software uses a genetic algorithm to "evolve" reactor designs for Schema's space-simulation game, Star-Made (http://star-made.org/). One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors. This program rectifies this issue by using a self-organizing variant of brute force search. Much of the search space...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    MathParser Java - Math Parser library

    MathParser Java - Math Parser library

    Mathematical Parser for Java

    This project gives a mathematical parser for converting a simple string expression into a result which can be managed for using in other calculations, all in Java. Using a couple lines of code, you'll be able to parse complex arithmetic expressions efficiently. This library is powered by Dijkstra's Shuting-yard algorithm. The library has no dependencies with other external libraries. Dependency <dependency> <groupId>com.google.code.mathparser-java</groupId...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15

    Fylogenetica

    Constructing level-1-networks consistent with a set of quartets

    This project is an implementation of an algorithm by J. Keijsper and R. Pendavingh. The goal of the algorithm is to construct a phylogenetic level-1-network that is consistent with a given set of quartets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 16
    Document Analysis and Exploitation
    The Document Analysis and Exploitation Platform is a Drupal based web interface to a cloud enabled Document Analysis resource set.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 17
    Semantic query optimization (SQO) is the process of finding equivalent rewritings of an input query given constraints that hold in a database instance. We present a Chase & Backchase (C&B) algorithm strategy that generalizes and improves on well-known methods in the field. The implementation of our approach, the pegasus system, outperforms existing C&B systems an average by two orders of magnitude. This gain in performance is due to a combination of novel methods that lower the complexity...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    DJDarwin

    DJDarwin

    A Genetic algorithm approach to creating beats.

    The program puts beats through evolution - survival, mutations, reproduction. The purpose, in the words of Africa Bambaataa - Looking for the perfect beat. Using a genetic­ algorithmic framework, the user's taste defines a Beat fitness function - she decides which beats survive and breed, and which join the choir invisible. In addition, the user can easily define an automatic fitness function, put the program on 'auto­pilot' mode, and let it speed up evolution. Different types of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    Mouse Run

    Mouse Run

    Programming Game, A Practice Tool for Building Intelligent Things

    .../(or whatever you like to call yourself) like us. This game will be a perfect practice tool for programmers like us to find the best algorithm solutions and make the mouse intelligent. To get information on this game, visit the Mouse Run website at http://mouse-run.appspot.com If you have found bugs or have a request, please do write it in the reviews. Thanks!
    Downloads: 1 This Week
    Last Update:
    See Project
  • 20
    sudoku Solver

    sudoku Solver

    A sudoku solver project built with Java with a user friendly interface

    This project has been built to allow you solve any Sudoku problem in no time. The project built using Java programming language. It`s simple interface built using Swing technology. A smart algorithm has been designed to solve your problem. First, using the systematic human way of solving. If the human failed to solve, your problem will be passed to a stronger algorithm that based on Try and Fail techniques and possibilities. Enjoy, learn and develop. You need to install Java JRE to run the .jar...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21
    Hide my message

    Hide my message

    Hide your secret message into any type of files

    Secrets is a Java application allow you to hide you message into any type of files either audio, video, text, dll or any type of files. It use a simple Cryptography algorithm to save the message in an secret way, so it can`t be read by any HexaReader. You can retrieve your message also in a very simple way by choosing the original file and click on Decode button. It was built using Java and Swing technology. It was published for educational use.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 22

    ResultsDB

    Manage your algorithm results.

    Downloads: 0 This Week
    Last Update:
    See Project
  • 23
    Cabra

    Cabra

    Study smarter and get smarter with the award-winning studying tool

    Much more than plain old flashcards... smart studying sessions, notes, printing, sharing. A must-have for any student! Get Cabra today and join the ten thousand students who are studying smarter and getting smarter! Features: -Create and study flashcards with an algorithm optimized for YOU -Create notes, print your flashcards, share your creation with the world... -Ranked best software in PA High School Computer Fair Still not convinced? Check out getcabra.com.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 24

    DeNovoCheck

    DeNovoCheck: Inheritance analysis for NGS trio data

    DeNovoCheck is intended to be used for inheritance analysis in NGS tio data. For rare dominant Mendelian diseases, patient-parent trios are often used to reduce the number of candidate variants. The algorithm bases the inheritance prediction on the data available in the parental BAM files and allows for a fast and reliable selection of potential de novo variants.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    MapPSO
    MapPSO is a tool for Ontology Alignment, which uses Discrete Particle Swarm Optimisation. A particle swarm is used to search for the optimal alignment. The algorithm is massively parallel and adapts naturally on parallel architectures.
    Downloads: 0 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.