Search Results - (( java application optimisation algorithm ) OR ( using internet patterns algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- internet patterns »
- java application »
- using internet »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
A behavioral trust model for internet of healthcare things using an improved FP-growth algorithm and Naïve Bayes classifier
Published 2021“…Towards securing these frameworks through an intelligent TMM, this work proposes a machine learning based Behavioral Trust Model (BTM), where an improved Frequent Pattern Growth (iFP-Growth) algorithm is proposed and applied to extract behavioral signatures of various trust classes. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…The performance tests are also conducted to assess whether each algorithm can detect most of the true anomalies. The data is supplied using IoT devices, and benchmark datasets are also presented to test the algorithm's performance.…”
Get full text
Get full text
Thesis -
4
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
5
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…Businesses have adopted certain algorithms that can help them to extract information from the Internet to discover potentially significant patterns inherent in the database, which can help the online marketing strategy. …”
Get full text
Get full text
Conference or Workshop Item -
6
Logo recognition using Artificial Neural Network (ANN) / Nor Hamidah Abdul Ghafar
Published 2005“…The binary representation was used for the input node of neural network for back propagation training algorithm. …”
Get full text
Get full text
Student Project -
7
A framework of enhanced authentication for PDF textual documents using Zigzag-LSB embedding algorithm
Published 2024“…The effectiveness of the algorithm has been established since it uses an image-based approach after conversion between document and images with a numbering pattern that is fragile to deletion, replacement, insertion, combine, and copy attack. …”
Get full text
Get full text
Thesis -
8
Cyber fraud profiling with routine activity theory using data mining techniques / Sunardi, Abdul Fadlil and Nur Makkie Perdana Kusuma
Published 2023“…Cyber-fraud profiling based on RAT with Naïve Bayes Algorithm yields the following findings: Potential Offender Elements: Male, using Facebook, WhatsApp, and Instagram, and crime scene region in Special Capital Region of Jakarta; Elements Suitable Target: Female, using Instagram, WhatsApp, and Facebook, living in the Special Region of Yogyakarta, spending time on the internet more than 8 hours a day, and have more than three IM applications; and Guardianship: Lack of knowledge about Cyber Fraud.…”
Get full text
Get full text
Article -
9
Direct approach for mining association rules from structured XML data
Published 2012“…The proposed method, XiFLEX has been implemented using two different techniques (java based & XQuery) and compared with the original FLEX algorithm in its basic implementation and the Apriori algorithm for frequent patterns generation. …”
Get full text
Get full text
Thesis -
10
Cognitive selection mechanism performance in IEEE 802.11 WLAN
Published 2013“…The results for the selection were evaluated respectively to see the variation in selection pattern when compared to the default selection algorithm. …”
Get full text
Get full text
Get full text
Article -
11
BIOLOGICAL INSPIRED INTRUSION PREVENTION AND SELF-HEALING SYSTEM FOR CRITICAL SERVICES NETWORK
Published 2011“…The design features of the proposed system are inspired by the human immune system, integrated with pattern recognition nonlinear classification algorithm and machine learning. …”
Get full text
Get full text
Thesis -
12
Design of monitoring and control system of electricity power limiter using internet of things
Published 2025“…This report discusses the design of monitoring and control system using Internet of Things (IoT) based power limiter, which is designed to monitor and manage electricity consumption in real-time. …”
Get full text
Get full text
Book Section -
13
Analysis of Chinese patents associated with incremental clustering algorithms: A review / Archana Chaudhari
Published 2022“…To achieve learning from such dynamic data sources, incremental clustering algorithms are used mandatorily. This mandate has given rise to increased patents related to incremental clustering concept, which is primarily a significant part of Machine Learning field. …”
Get full text
Get full text
Get full text
Article -
14
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…This huge amount of data can be a useful source of knowledge. Advanced mining processes are needed for this knowledge to be extracted, understood and used. …”
Get full text
Get full text
Article -
15
Enhancing data integrity in internet of things-based healthcare applications: a visualization approach for duplicate detection
Published 2025“…A Python-based visualization framework using Pandas and Matplotlib was developed to detect and represent duplicate records. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
The Rise of Blockchain Internet of Things (BIoT): Secured, Device-to-Device Architecture and Simulation Scenarios
Published 2022“…As a result, to deliver acceptable services, a new solution is necessary to secure data accountability, increase data privacy and accessibility, and extract hidden patterns and usable knowledge. Moving the Internet of Things to a distributed ledger system might be the most effective way to solve these issues. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
17
Enhancing data integrity in internet of things-based healthcare applications: A visualization approach for duplicate detection
Published 2025“…A Python-based visualization framework using Pandas and Matplotlib was developed to detect and represent duplicate records. …”
Get full text
Get full text
Get full text
Article -
18
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
19
Anomaly detection in network traffic using machine learning
Published 2026“…One effective method to achieve this is to implement machine learning techniques, which have gained attention among researchers for analyzing complex patterns in datasets. In this paper, an anomaly detection method is proposed using machine learning (ML) techniques. …”
Get full text
Get full text
Get full text
Article -
20
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…A novel security component named â��intelligent security engineâ�� is introduced which learns the possible occurrences of security threats on SOA using artificial neural networks learning algorithms, then it predicts the potential attacks on SOA based on obtained results by the developed theoretical security model, and the written algorithms as part of security solution prevent the SOA attacks. …”
Get full text
Get full text
Article
