Search Results - (( framework implementation drops algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- framework implementation »
- implementation drops »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The first algorithm, named as Framework Initialization algorithm, is developed to initialize the framework and discovering the subsystems configured in order to derive the interoperation tasks. …”
Get full text
Get full text
Thesis -
5
Immune-based technique for undergraduate programmes recommendation / Muhammad Azrill Mohd Zamri
Published 2017“…Based on the framework, a prototype was implemented to evaluate the accuracy of the proposed technique. 52% is the highest accuracy obtained from the technique by using ten-fold cross validation. …”
Get full text
Get full text
Thesis -
6
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS
Published 2012“…However, these solutions still do not satisfy the existing safety applications standard or have larger message size due to increased message drop ratio. In this thesis, a security framework is presented; one that uses both standard asymmetric PKI and symmetric cryptography for faster and secured safety message exchange. …”
Get full text
Get full text
Thesis -
11
Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm
Published 2018“…Cache updates is an example of BE noncritical traffic. In this paper, we implement a novel biologically inspired fault-tolerant algorithm that provides both GT and BE QoS. …”
Get full text
Get full text
Article -
12
Bio-inspired network on chip having both guaranteed throughput and best effort services using fault-tolerant algorithm
Published 2018“…Cache updates is an example of BE noncritical traffic. In this paper, we implement a novel biologically inspired fault-tolerant algorithm that provides both GT and BE QoS. …”
Get full text
Get full text
Article -
13
CHID : conditional hybrid intrusion detection system for reducing false positives and resource consumption on malicous datasets
Published 2017“…The result of the evaluation showed that CHID gains a significant performance improvement in terms of resource consumption and packet drop rate, compared to the default packet-based detection implementation. …”
Get full text
Get full text
Get full text
Thesis -
14
Simulated Kalman Filter algorithms for solving optimization problems
Published 2019“…In the benchmarking of the SKF and ssSKF algorithms’ performance in solving the 14-hole PCB drill path optimization case study with recent implementations, on average, both algorithms show the ability to converge to the optimal solution at a smaller number of function evaluations compared to the Gravitational Search Algorithm (GSA), Cuckoo Search (CS), and Intelligent Water Drop (IWD), although fall-short to the Taguchi- Genetic Algorithm optimization algorithm.…”
Get full text
Get full text
Thesis -
15
A broadband cooperative relay-based system for power line communication
Published 2018“…Outage probability achieved a land marking drop over the benchmark links and 87.5% over the PLCC (fixed) link. …”
Get full text
Get full text
Thesis
