Search Results - (( data selection ((path algorithm) OR (_ algorithm)) ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- data selection »
- path algorithm »
-
1
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…Sequential pattern mining is a new branch of data, mining science that solves inter-transaction pattern mining problems. …”
Get full text
Get full text
Thesis -
2
Automated path testing using the negative selection algorithm
Published 2017“…Negative selection algorithm (NSA) has been used in this paper to generate test data for path testing automatically. …”
Get full text
Get full text
Indexed Article -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
4
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Such an in-band probing algorithm reduces measurement overhead on the selected overlay path. …”
Get full text
Get full text
Thesis -
5
-
6
Weighted Sum-Dijkstra’s Algorithm in Best Path Identification based on Multiple Criteria
Published 2018“…Dijkstra’s Algorithm is a shortest path algorithm that considers a single criterion only. …”
Get full text
Get full text
Get full text
Article -
7
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network
Published 2019“…Currently, the data transmission from sensor nodes to the cluster head uses a single hop which consumes more energy; thus, in this paper the enhancement of previous algorithm, which is MAP, the data transmission will use several paths to reach the cluster head. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
9
Multi agent quality of service routing based on scheme ant colony optimization algorithm
Published 2014“…This study also introduces a new probe-based procedure for discovery and setup QoS path for real-time traffic. The proposed scheme has been simulated by OMNET++ and compared with standard AntNet and two well-known standard QoS routings; Widest Shortest Path (WSP) algorithm and Shortest Widest Path (SWP) algorithm. …”
Get full text
Get full text
Thesis -
10
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…The ACO algorithm in the Bluetooth M-LPNWSN system reduces energy consumption by 60% over 500 iterations and significantly improves data delivery rates by adapting dynamically to network topology and traffic. …”
Get full text
Get full text
Get full text
Thesis -
11
Design of radix-4 single path delay fast fourier transform processor with genetic algorithms optimization
Published 2011“…This research work involves the implementation of Single Objective Genetic Algorithm (SOGA) and Multi-objectives Genetic Algorithm (MOGA) in a 16-point Radix-4 Single Path Delay Feedback (R4SDF) pipelined Fast Fourier Transform (FFT) processor. …”
Get full text
Get full text
Thesis -
12
Predetermined path of mobile data gathering in wireless sensor networks based on network layout
Published 2014“…Thus, within each of these divided areas, the multi-hop collection is deployed as a sub-set to the main collection. The ME will select a centroid point between two sub-polling points, subsequently selecting common turning points as the core of the basis of the tour path. …”
Get full text
Get full text
Article -
13
Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman
Published 2017“…Therefore, in this research, will be use Ant Colony Optimization (ACO) algorithm as an optimize technique that provide a shortest path of defining a successor that is their highest value of criteria. …”
Get full text
Get full text
Thesis -
14
Finding the shortest route using Dijkstra’s algorithm with application to ride hailing in UiTM Cawangan Negeri Sembilan Kampus Seremban / Nur Husnina Hassan, Nurin Hadrah Syahira M...
Published 2022“…The Dijkstra's Algorithm is expected to be able to complete the study for the shortest path with a minimum of time. …”
Get full text
Get full text
Student Project -
15
Delay-based load-balancing routing (DLBR) algorithm for wireless ad-hoc networks
Published 2015“…The DLBR then uses this metric to select high capacity links for data forwarding, thus providing paths with less congested nodes and high capacity links. …”
Get full text
Get full text
Conference or Workshop Item -
16
Delay-based load-balancing routing (DLBR) algorithm for wireless ad-hoc networks
Published 2015“…The DLBR then uses this metric to select high capacity links for data forwarding, thus providing paths with less congested nodes and high capacity links. …”
Get full text
Get full text
Conference or Workshop Item -
17
Vehicle routing problem using genetic algorithm / Shamini Nagaratnam
Published 2006“…This dissertation studies and explores the potential of using Genetic Algorithms to find the shortest path in Vehicle Routing Problem. …”
Get full text
Get full text
Get full text
Thesis -
18
Development Of Generative Computer-Aided Process Planning System For Lathe Machining
Published 2019“…Furthermore, to minimize unit production cost, machining parameters including cutting speed (CS), feed rate (f) and depth of cut (d) were optimized for regular form surfaces by using firefly algorithm (FA). These parameters were then useful for tooling selections and tool-path planning. …”
Get full text
Get full text
Thesis -
19
Novel Link Establishment Communication Scheme against Selfish Attack Using Node Reward with Trust Level Evaluation Algorithm in MANET
Published 2022“…This scheme selects genuine node for routing path production, by using the node reward with dependence level estimating algorithm to compute every node trust level and resource range, to disconnect higher trust level node and lower trust level node; higher trust level node is a genuine node which performs secure communication. …”
Get full text
Get full text
Article -
20
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…Although useful, the existing algorithms does not provide any comparative data to select an algorithm based on the problem size and difficulty and the use of other neighborhood algorithms (including Great Deluge and Late Acceptance Hill Climbing) has not been sufficiently explored as well. …”
Get full text
Get full text
Thesis
