Search Results for "apriori algorithm in java" - Page 7

Showing 448 open source projects for "apriori algorithm in java"

View related business solutions
  • Our Free Plans just got better! | Auth0 Icon
    Our Free Plans just got better! | Auth0

    With up to 25k MAUs and unlimited Okta connections, our Free Plan lets you focus on what you do best—building great apps.

    You asked, we delivered! Auth0 is excited to expand our Free and Paid plans to include more options so you can focus on building, deploying, and scaling applications without having to worry about your security. Auth0 now, thank yourself later.
    Try free now
  • Build Securely on AWS with Proven Frameworks Icon
    Build Securely on AWS with Proven Frameworks

    Lay a foundation for success with Tested Reference Architectures developed by Fortinet’s experts. Learn more in this white paper.

    Moving to the cloud brings new challenges. How can you manage a larger attack surface while ensuring great network performance? Turn to Fortinet’s Tested Reference Architectures, blueprints for designing and securing cloud environments built by cybersecurity experts. Learn more and explore use cases in this white paper.
    Download Now
  • 1
    Fileprivacy

    Fileprivacy

    Fileprivacy easily encrypts your files

    ... change the algorithm after setting the keylength. It has to be restarted for further use. Because there are no start scripts, yet, you have to start Fileprivacy from console by typing: java -jar Fileprivacy-1.0_<version>.jar ####### ALSO NOTE ####### The author of this software is not responsible for the safety of your data. There is no guarantee that one or more of the implemented algorithms cannot be compromised.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 2

    JCryptor

    JCryptor is an encrypting tool based on the Caesar-cipher.

    JCryptor uses the Caesar-cipher to encrypt keystrokes on-the-fly. It can also be used to decrypt an encrypted text easily. Caesar-cipher is a simple encryption algorithm, developed by Julius Caesar, to encrypt his correspondence with Cicero in the ancient world. Therefore it uses a simple character substitution method to replace a given character by another. A keyshift of thirteen is called ROT13. ROT13 can be decrypted by encrypting it again with ROT13. Even today this simple method is used...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 3

    AlgART Java Libraries

    Open source library for processing arrays and matrices

    AlgART Java libraries for processing arrays and matrices are open-source product, distributed under MIT license. So, anyone can use them for free without any restrictions. Main features: 63-bit addressing of array elements (64-bit long int indexes), memory model concept (allowing storing data in different schemes from RAM to mapped disk files), wide usage of lazy evaluations, built-in multithreading optimization for multi-core processors, wide set of image processing algorithms over matrices...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 4
    Mouse Rate

    Mouse Rate

    OS independent mouse rate checker written in Java.

    Tiny program written in Java, which provides OS - independent and clean algorithm to measure your mouse rate (mouse latency). Java 7u5 or higher needed to run version 1.1 and lower. Java 7u40 or higher needed to run version 1.2 and higher. **Version 1.3 changes - Fixed graphic artefacts appearing while program window is dragged. **Version 1.2 changes - Major code review & cleanup - Mouse watching algorithm optimized - Duplicate cursor statistics calculations removed & rewritten...
    Downloads: 12 This Week
    Last Update:
    See Project
  • Secure remote access solution to your private network, in the cloud or on-prem. Icon
    Secure remote access solution to your private network, in the cloud or on-prem.

    Deliver secure remote access with OpenVPN.

    OpenVPN is here to bring simple, flexible, and cost-effective secure remote access to companies of all sizes, regardless of where their resources are located.
    Get started — no credit card required.
  • 5

    Levenshtein distance Java Libarary

    Java library implementing Levensh distnce

    Downloads: 0 This Week
    Last Update:
    See Project
  • 6
    Unsupervised TXT classifier

    Unsupervised TXT classifier

    Classify any two TXT documents, no training required - JAVA

    This program is made to address two most common issues with the known classifying algorithms. First, over-training and second, shortage of data for a training of categories. Instead, each TXT file is a category on its own, rather than an assigned category. In a way, this is similar to clustering but not really a clustering algorithm since there is some training involved. The summarizer from Classifier4J has been adjusted to accept two inputs (lets call them A and B). Then, the summarizer gets...
    Downloads: 1 This Week
    Last Update:
    See Project
  • 7
    ijblob
    The IJBlob library indentifying connected components in binary images. The algorithm used for connected component labeling is: Chang, F. (2004). A linear-time component-labeling algorithm using contour tracing technique. Computer Vision and Image Understanding, 93(2), 206–220. doi:10.1016/j.cviu.2003.09.002 The ImageJ *Shape Filter Plugin* (see downloads) uses this library for flitering the blobs by its shape. If you are using IJBlob in a scientific publication, please cite...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 8

    bioluminescence

    A java library for polymorphic genome assembly.

    Bioluminescence is a java library for facilitating de novo genome assembly in the context of reads sampled from a single highly-polymorphic diploid individual. Bioluminescence implements a novel algorithm which uses an artificial neural network to classify contigs in a genome assembly as haplotype-specific or not-haplotype-specific. It then uses this information to partition the original input read set into two subsets, each of which has been enriched for one of the haplotypes. Initial results...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 9
    gannu

    gannu

    Java API and tools for performing NLP and other AI tasks

    Java API and tools for performing a wide range of AI tasks such as: word sense disambiguation (released), optimization (5 Evolutionary Algorithms Implemented ETA February 2014), opinion mining (ETA November 2014) and text wikification (ETA July 2014). Gannu includes some graphical interfaces for scientific purposes. When using Gannu please cite: *Jiménez, F. V., Gelbukh, A. F. & Sidorov, G. (2013). Simple Window Selection Strategies for the Simplified Lesk Algorithm for Word Sense...
    Downloads: 0 This Week
    Last Update:
    See Project
  • Picsart Enterprise Background Removal API for Stunning eCommerce Visuals Icon
    Picsart Enterprise Background Removal API for Stunning eCommerce Visuals

    Instantly remove the background from your images in just one click.

    With our Remove Background API tool, you can access the transformative capabilities of automation , which will allow you to turn any photo asset into compelling product imagery. With elevated visuals quality on your digital platforms, you can captivate your audience, and therefore achieve higher engagement and sales.
    Learn More
  • 10

    WOLFSIM: Wideband Optical FDTD Simulator

    FDTD Electomagnetic Wave Simulation Software

    ... these publications for full details on the algorithm: http://www.ece.ncsu.edu/oleg/files-wiki/6/62/SPIE_12_Miskiewicz_wolfsim3D.pdf http://www.ece.ncsu.edu/oleg/files-wiki/1/13/OptExpress07_OH.pdf
    Downloads: 0 This Week
    Last Update:
    See Project
  • 11
    Java application for training and deploying text processing applications such as part-of-speech taggers, based on a re-implementation of Brill's algorithm in Java.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 12
    totp-me

    totp-me

    TOTP authenticator for Java ME

    Not only a Google authenticator for 2-step verification for Java ME enabled phones. This is MIDlet-1.0 implementation of RFC 6238 authenticator - TOTP: Time-Based One-Time Password Algorithm. It's quick, simple and it supports multiple profiles.
    Downloads: 3 This Week
    Last Update:
    See Project
  • 13

    Damerau Levenshtein

    Java Library for Damerau Levenshtein Algorithm

    Downloads: 0 This Week
    Last Update:
    See Project
  • 14
    Java generic Iterator implementation to generate permutations and combinations. Uses the algorithm described here http://en.wikipedia.org/wiki/Steinhaus%E2%80%93Johnson%E2%80%93Trotter_algorithm#Even.27s_speedup and the clear description of that algorithm here: http://www.cut-the-knot.org/Curriculum/Combinatorics/JohnsonTrotter.shtml
    Downloads: 0 This Week
    Last Update:
    See Project
  • 15
    The Java RTree project aims to maintain an Java version of the RTree spatial indexing algorithm. See http://jsi.sourceforge.net for more information, and http://github.com/aled/jsi for latest development code.
    Leader badge
    Downloads: 330 This Week
    Last Update:
    See Project
  • 16

    Approximate Subgraph Matching Algorithm

    Approximate Subgraph Matching Algorithm for Dependency Graphs

    ..., the total worst-case algorithm complexity is O(m^n * n(n-1)/2 * km * log m). This Java implementation implements our ASM algorithm. See README file: https://sourceforge.net/projects/asmalgorithm/files/ If you use our ASM implementation to support academic research, please cite the following paper: Haibin Liu, Lawrence Hunter, Vlado Keselj, and Karin Verspoor. Approximate Subgraph Matching-based Literature Mining for Biomedical Events and Relations. PLOS ONE, 8:4 e60954, 2013.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 17

    VIM cloud

    Web Based IaaS Cloud Controller (VimCloud)

    This is a pure IaaS cloud controller with all the basic functionality of IaaS Cloud Controller. This uses proposed “Trust Based Scheduling Algorithm and Load Balancing Algorithm”. It uses Cloud Architecture with Trust Management layer. It uses Qemu machine emulator and virtualizer as virtualization software at Host. It uses Libvirt driver [30] to interact with Qemu and to interact with its virtualization capabilities of a range of operating systems. Libvirt provides a common, generic and stable...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 18
    NeSSi2

    NeSSi2

    Network security simulator

    At the moment NeSSi² is not actively maintained anymore since we are planning a successor project. NeSSi² is a network simulation tool suite addressing in particular network security aspects. Sample capabilities are profile-based attack generation, traffic analysis and support for attack/malware detection algorithm plugins.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 19
    MathParser Java - Math Parser library

    MathParser Java - Math Parser library

    Mathematical Parser for Java

    This project gives a mathematical parser for converting a simple string expression into a result which can be managed for using in other calculations, all in Java. Using a couple lines of code, you'll be able to parse complex arithmetic expressions efficiently. This library is powered by Dijkstra's Shuting-yard algorithm. The library has no dependencies with other external libraries. Dependency <dependency> <groupId>com.google.code.mathparser-java</groupId...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 20

    Reactor Breeder

    A Genetic Algorithm for Reactors in StarMade

    This software uses a genetic algorithm to "evolve" reactor designs for Schema's space-simulation game, Star-Made (http://star-made.org/). One of the more unique aspects of the game is that ship power management is not as simple as filling a cube with power generation blocks. This mechanism leads to difficulties in getting maximal power generation out of such reactors. This program rectifies this issue by using a self-organizing variant of brute force search. Much of the search space...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 21

    Fylogenetica

    Constructing level-1-networks consistent with a set of quartets

    This project is an implementation of an algorithm by J. Keijsper and R. Pendavingh. The goal of the algorithm is to construct a phylogenetic level-1-network that is consistent with a given set of quartets.
    Downloads: 0 This Week
    Last Update:
    See Project
  • 22
    Document Analysis and Exploitation
    The Document Analysis and Exploitation Platform is a Drupal based web interface to a cloud enabled Document Analysis resource set.
    Downloads: 1 This Week
    Last Update:
    See Project
  • 23
    Semantic query optimization (SQO) is the process of finding equivalent rewritings of an input query given constraints that hold in a database instance. We present a Chase & Backchase (C&B) algorithm strategy that generalizes and improves on well-known methods in the field. The implementation of our approach, the pegasus system, outperforms existing C&B systems an average by two orders of magnitude. This gain in performance is due to a combination of novel methods that lower the complexity...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 24
    DJDarwin

    DJDarwin

    A Genetic algorithm approach to creating beats.

    The program puts beats through evolution - survival, mutations, reproduction. The purpose, in the words of Africa Bambaataa - Looking for the perfect beat. Using a genetic­ algorithmic framework, the user's taste defines a Beat fitness function - she decides which beats survive and breed, and which join the choir invisible. In addition, the user can easily define an automatic fitness function, put the program on 'auto­pilot' mode, and let it speed up evolution. Different types of...
    Downloads: 0 This Week
    Last Update:
    See Project
  • 25
    Mouse Run

    Mouse Run

    Programming Game, A Practice Tool for Building Intelligent Things

    .../(or whatever you like to call yourself) like us. This game will be a perfect practice tool for programmers like us to find the best algorithm solutions and make the mouse intelligent. To get information on this game, visit the Mouse Run website at http://mouse-run.appspot.com If you have found bugs or have a request, please do write it in the reviews. Thanks!
    Downloads: 1 This Week
    Last Update:
    See Project
Want the latest updates on software, tech news, and AI?
Get latest updates about software, tech news, and AI from SourceForge directly in your inbox once a month.