Search Results - (( java implementation mining algorithm ) OR ( based construction protocol algorithm ))
Search alternatives:
- implementation mining »
- construction protocol »
- java implementation »
- based construction »
- protocol algorithm »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Multi-Hop Selective Constructive Interference Flooding Protocol For Wireless Sensor Networks
Published 2019“…The second step in MSCIF protocol involves designing a selection algorithm to select the minimum connected dominating nodes. …”
Get full text
Get full text
Thesis -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…CBH shows that by grouping the nodes into clusters and having only one replica in each cluster, has minimized the number of replicas involved in constructing read and write quorums. This research has contributed a dynamic cluster-based hybrid replica control protocol which proposed a clustering algorithm to determine the number of clusters, a mechanism for dynamic participation of nodes in the network, and a replica placement algorithm that produces low communication cost and high data availability as compared to DH and DDG protocols. …”
Get full text
Get full text
Thesis -
9
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…This thesis proposes some techniques to enhance the AMTree protocol. First we propose two algorithms to improve the handoff process in AMTree protocol. …”
Get full text
Get full text
Thesis -
10
-
11
Code-Based Signature Schemes For Online Voting System Based On The Blockchain Technology
Published 2022“…Thus, we introduce a new code-based key exchange protocol that is constructed using the Permuted Goppa Syndrome Decoding Problem. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
13
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…For EL video packets, an enhanced routing algorithm was proposed to route the Enhance Layer (EL) packets, namely, Energy Sensible and Route Stability Based Routing Protocol (ESRSBRP) which is used over Mobile network. …”
Get full text
Get full text
Get full text
Thesis -
14
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
15
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
Get full text
Get full text
Thesis -
16
Enhanced marking process (EMP) for constructing dominating set in mobile ad-hoc networks with unidirectional links
Published 2014“…An enhanced distributed algorithm is presented that is based on the marking process which is has been introduced in earlier work. …”
Get full text
Get full text
Get full text
Article -
17
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
Published 2004“…It provides a general framework for constructing and analyzing authentication protocols in realistic models of communication networks. …”
Get full text
Get full text
Thesis -
18
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
19
Automated multi-agent negotiation framework for the construction domain
Published 2023Conference Paper -
20
Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations
Published 2019“…Clustering approach in wireless sensor network is very important, the structure of cluster and how to improve it is a first challenge that faced the developers, because of it represent as a base for design the cluster-based routing protocol. …”
Get full text
Get full text
Get full text
Article
