Search Results - (( developing small protocols algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- protocols algorithm »
- application mining »
- developing small »
- java application »
- mining algorithm »
- small protocols »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…The survey concluded that protocol designers must focus on the development and implementation of fire-adaptive routing protocols, incorporating optimal fault tolerance routing algorithms that adapt seamlessly to unforeseen environmental changes, including fire incidents. …”
Article -
8
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2016“…This paper focuses on developing a proactive multi-copy routing protocol with carry and forward mechanism that is able to deliver packets from a source vehicle to a destination vehicle at a small delivery delay. …”
Get full text
Get full text
Get full text
Article -
9
Proactive multi-copy routing protocol for urban vehicular ad hoc network
Published 2015“…This paper focuses on developing a proactive multi-copy routing protocol with carry and forward mechanism that is able to deliver packets from a source vehicle to a destination vehicle at a small delivery delay. …”
Get full text
Get full text
Get full text
Article -
10
-
11
-
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
13
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…The performance evaluations proved that a small-scale yet robust ML-IDS algorithm is successfully developed to classify traffic and blocking attack traffic, while proposed ML-RA successfully offer better delay and throughput performance than the RIPv2 routing protocol.…”
text::Thesis -
14
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…This thesis proposed a solution technique referred to as an Enhanced Transmit Packet Coding (enhanced-TPC) and weighted division algorithm (WDA) in Relay suitability-based routing protocol (RESP) term as WDA-RESP. …”
Get full text
Get full text
Thesis -
15
Position-based multicast routing in mobile ad hoc networks: an analytical study
Published 2012“…Most of the existing QoS multicast routing protocols are designed with flat topology and small networks in mind. …”
Get full text
Get full text
Article -
16
Efficient Discovery Protocol for Ubiquitous Communication in Wireless Environment
Published 2009“…In this research a new mechanism and algorithm is designed to improve current wireless service discovery protocols. …”
Get full text
Get full text
Thesis -
17
Intrusion detection on the in-vehicle network using machine learning
Published 2021Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
Plug and play innosat ACS simulator
Published 2015“…The MSE values that have been calculated also show that there are a close match between HILS and MATLAB simulation where the MSEs different value are small. From both results, it is enough to verify that the developed protocol working satisfyingly and seems to be possible to be implemented on the actual flight.…”
Get full text
Get full text
Article -
20
Remote Monitoring of COVID-19 Patients Using Multisensor Body Area Network Innovative System
Published 2023Article
