Search Results - (( java implementation mining algorithm ) OR ( basic internet selection algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- selection algorithm »
- internet selection »
- mining algorithm »
- basic internet »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
An ensemble feature selection method to detect web spam
Published 2018“…In addition, it improves classification metrics in comparison to basic feature selection methods.…”
Get full text
Get full text
Get full text
Article -
9
HybridFlood: minimizing the effects of redundant messages and maximizing search efficiency of unstructured peer-to-peer networks
Published 2014“…Peer-to-peer systems are important Internet applications. A major portion of Internet traffic belongs to such applications. …”
Get full text
Get full text
Get full text
Article -
10
The development of semantic meta-database: an ontology based semantic integration of biological databases
Published 2007“…The tool comprises two intelligent algorithms. The first algorithm combines parallel genetic algorithm with the split-and-merge algorithm. …”
Get full text
Get full text
Monograph -
11
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
12
Adaptive security architecture for protecting RESTful web services in enterprise computing environment
Published 2018“…In this modern era of enterprise computing, the enterprise application integration (EAI) is a well-known industry-recognized architectural principle that is built based on loosely coupled application architecture, where service-oriented architecture (SOA) is the architectural pattern for the implementation of EAI, whose computational elements are called as â��services.â�� Though SOA can be implemented in a wide range of technologies, the web services implementation of SOA becomes the current selective choice due to its simplicity that works on basic Internet protocols. …”
Get full text
Get full text
Article -
13
Development and integration of capacitive sensing and electrocuting grid for mosquitoes surveillance and control
Published 2020“…The final proposed system is tested with a basic species recognition algorithm and achieved species recognition rate of between 75% to 83% and selective trapping rate of between 63% to 69%.…”
Get full text
Get full text
Get full text
Thesis -
14
Enhanced Mobility Solution In Mobile Ipv6 Network
Published 2008“…The solution is important by enterprises in making decision to acquire internet connectivity for the purpose of connectivity redundancy and traffic load distribution optimization. …”
Get full text
Get full text
Thesis -
15
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 1, the concept of in�cremental learning is briefly described and basic theories on Resource Allocating Network (RAN) and conventional data selection method are discussed in this chapter. …”
Get full text
Get full text
Thesis
