Search Results - (( generation classifications protocol algorithm ) OR ( java application modified algorithm ))
Search alternatives:
- generation classifications »
- classifications protocol »
- application modified »
- protocol algorithm »
- java application »
-
1
Classification model for predictive maintenance of small steam sterilisers
Published 2020“…They perform exploratory experiments to find a suitable classification model. This study found that the random forest algorithm performed best in terms of accuracy for both the vacuum pump and steam generator data sets (83.5 and 82.0%, respectively). …”
Get full text
Get full text
Get full text
Article -
2
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
Published 2018“…Thus the proposed algorithm prolongs the network under consideration by 57 – 62% as compared to networks with conventional routing protocols.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
4
A Machine Learning Classification Approach to Detect TLS-based Malware using Entropy-based Flow Set Features
Published 2022“…Moreover, new Transmission Control Protocol features not explored in literature were incorporated into TLSMalDetect, and their contribution was assessed. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
6
Internet of Things (IoT) based activity recognition strategies in smart homes: a review
Published 2022“…The obtained data can be subjected to extensive preprocessing and feature extraction tasks before being learned using appropriate machine learning or deep learning algorithms to generate a model capable of managing human activities more effectively. …”
Get full text
Get full text
Article -
7
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
8
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
10
