Search Results - (( data virtualization path algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- data virtualization »
- virtualization path »
- application mining »
- java application »
- mining algorithm »
- path algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Sistem navigasi berasaskan algoritma Dijkstra di dalam persekitaran tiga dimensi
Published 2008“…Therefore, it is the aim of this study to conduct a research about the Dijsktra’s algorithm implementation for shortest path calculation in 3D environment. …”
Get full text
Get full text
Get full text
Thesis -
8
A new routing mechanism for energy-efficient in bluetooth mesh-low power nodes based on wireless sensor network
Published 2023“…The multi-criterion energyefficient routing mechanism uses the ACO algorithm, inspired by ants' foraging behaviour. In Bluetooth M-LPNWSN systems, virtual ants explore paths based on signal robustness, distances, and energy consumption. …”
Get full text
Get full text
Get full text
Thesis -
9
Design and implementation of MD5 hash function algorithm using verilog HDL
Published 2022“…The architecture includes MD5 padding block, data path, and a controller. A general concept and implementation of the MD5 hash function is described. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
Development of obstable avoidance system for 3D robot navigation
Published 2024“…In conclusion, the developed algorithm enables the robot to detect obstacles that are not on the same plane as the 2D LiDAR and cannot be detected using depth camera data.…”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Design and Implementation of MDS Hash Function Algorithm Using Verilog HDL
Published 2020“…The architecture includes MD5 padding block, data path, and a controller. A general concept and implementation of the MD5 hash function is described. …”
Get full text
Get full text
Get full text
Article -
13
Vehicle route tracking system based on vehicle registration number recognition using template matching algorithm
Published 2021Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Intruder localization wireless sensor network radar design with virtual reference tags
Published 2014“…This research designs a WSN (Wireless Sensor Network) algorithm for human intruder localization and path detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
Get full text
Get full text
Thesis -
16
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…The fast rise in data traffic and the vast range of services and applications accessible in 5G networks must be addressed effectively. …”
Get full text
Get full text
Thesis -
17
End to end performance analysis over IP RAN network / Armi Shahran Mohamad
Published 2011“…Due to that functionality, ATM makes a good choice for a network that must handle both traditional high-speed data (e.g. File transfer), and real time, low latency content such as voice and video. …”
Get full text
Get full text
Thesis -
18
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…The scheme showed better data delivery and lower average-end-to-end delay with good flooding efficiency. …”
Get full text
Get full text
Get full text
Thesis
