Search Results - (( java implementation mining algorithm ) OR ( making based protocol algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- protocol algorithm »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
New algorithms to minimize handoff latency in AMTree protocol
Published 2009“…This allows programmers to enhance existing protocols or deploy new protocols. AMTree protocol is an active network based protocol that makes sending packets to receivers, after source migration, an efficient process. …”
Get full text
Get full text
Get full text
Article -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…It makes the cluster-based routing protocols less efficient. …”
Get full text
Get full text
Thesis -
9
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
10
A conceptual automated negotiation model for decision making in the construction domain
Published 2023Conference Paper -
11
GSAR: Greedy Stand-Alone Position-Based Routing protocol to avoid hole problem occurance in Mobile Ad Hoc Networks
Published 2014“…The DRESM algorithm is responsible for making forwarding decisions based on multiple routing metrics. …”
Get full text
Get full text
Get full text
Thesis -
12
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…Some approach had been proposed to make routing protocol becomes e±cient and correct. …”
Get full text
Get full text
Thesis -
13
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
14
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…AMTree is an active network based protocol intended to make the sending packets to the tree after source migration an efficient process without much modifications to the multicast tree. …”
Get full text
Get full text
Thesis -
15
Reliable low power network protocol in IoT for agriculture field
Published 2024“…The data link layer protocol handles the Medium Access Control (MAC) of the mesh network efficiently using algorithms based on the Scheduling sub-cycle of the Fast, Adaptive, and Energy-efficient Multi-channel-multi-path (FAEM) protocol by Liew et al. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
A qualitative comparison of position-based routing protocols for ad-hoc networks
Published 2009“…This paper presents an overview and a qualitative comparison of the existing Ad-Hoc routing protocols that make forwarding decisions based on the geographical position of a packet's destination. …”
Get full text
Get full text
Get full text
Article -
17
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…First, the proposed incomplete cooperative game theoretic based MAC (GT-MAC) protocol, improves on the existing wireless sensor MAC protocols by offering significant network performance and lifetime extensions over the existing IEEE 802.15.4\Zigbee standards based WSN protocols. …”
Get full text
Get full text
Thesis -
18
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…Third, the LEACH routing protocol is modified by combining ELEC routing protocol with it. …”
Get full text
Get full text
Thesis -
19
A true random number generator for crypto embedded systems
Published 2006“…In this paper, we design a true random number generator (TRNG) in hardware which is targeted for FPGA-based crypto embedded systems. All crypto protocols require the generation and use of secret values that must be unknown to attackers. …”
Get full text
Get full text
Article -
20
A scheduled activity energy aware distributed clustering algorithm for wireless sensor networks with nonuniform node distribution
Published 2014“…Nonuniform node deployment makes the cluster-based routing protocol less efficient in wireless sensor networks (WSNs). …”
Get full text
Get full text
Get full text
Article
