Search Results - (( java implementation mining algorithm ) OR ( parameter classification protocol algorithm ))
Search alternatives:
- parameter classification »
- classification protocol »
- implementation mining »
- java implementation »
- protocol algorithm »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
Fair bandwidth distribution marking and scheduling algorithm in network traffic classification
Published 2019“…Second, an Optimized time sliding window packet marker (OTSWTCM) algorithm. This algorithm depends on the adaptability of the concept in the ITSWTCM, I2TSWTCM and M2I2TSWTCM algorithms for affecting the fairness and multiple protocols. …”
Get full text
Get full text
Thesis -
8
Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak
Published 2019“…The third stage is to classify individual jammers according to the specific pattern and characteristics design as defined in jamming identification and classification parameters. It involves development of Max-Min Rule-Based Classification Algorithm. …”
Get full text
Get full text
Thesis -
9
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Energy-efficient intrusion detection in wireless sensor network
Published 2012“…This paper provides an overview of the research on IDS in WSNs, focusing on routing protocol classification depending on network structure with respect to energy consumption as a crucial parameter in these kinds of networks. …”
Get full text
Get full text
Conference or Workshop Item -
11
Mitigating Slow Hypertext Transfer Protocol Distributed Denial of Service Attacks in Software Defined Networks
Published 2021“…Genetic algorithm was used to select the Netflow features which indicates the presence of an attack and also determine the appropriate regularization parameter, C, and gamma parameter for the Support Vector Machine classifier. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
13
Analysis On QOS Parameters To Predict Http Response
Published 2017“…Therefore, the real live world web service label data uses to evaluate the focus parameters using classification machine learning algorithms to process the data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Three-dimensional craniometrics identification model and cephalic index classification of Malaysian sub-adults: A multi-slice computed tomography study / Sharifah Nabilah Syed Mohd...
Published 2024“…MIMICS software version 21.0 (Materialise, Leuven, Belgium) was used to construct 3D models and plane-to-plane (PTP) protocol was utilised to measure 14 selected craniometric parameters. …”
Get full text
Get full text
Get full text
Thesis
