Search Results - (( java implementation mining algorithm ) OR ( parameter destination _ algorithm ))
Search alternatives:
- implementation mining »
- parameter destination »
- java implementation »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Modelling of multi-robot system for search and rescue
Published 2023“…In this project, this sensor-based algorithm is known as the Obstacle Avoidance Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network
Published 2019“…The aim of this paper is to find the best possible route from the source to the destination based on a method inspired by the searching behaviour of bee colonies, i.e. artificial bee colony (ABC) algorithm. …”
Get full text
Get full text
Article -
10
Review of Network on Chip Architectures
Published 2017“…The packet traverses along these nodes to reach the destination using routing algorithm. Conclusion: In this paper, NoC architectures are reviewed using different parameters, detail information is also provided for these parameters. …”
Get full text
Get full text
Article -
11
A genetic approach for gateway placement in wireless mesh networks
Published 2015“…Finally, we evaluated the proposed algorithm using many generated instances using different parameters (population size, tournament size, crossover type, mutation type), the experimental results had shown that the high convergence rate using different parameters. …”
Get full text
Get full text
Get full text
Article -
12
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…The main goal of this research is to compare the performances between Genetic Algorithm (GA) and Ant Colony Optimization (ACO) algorithm. …”
Get full text
Get full text
Thesis -
13
Collision avoidance mechanisms using artificial potential field for UAVs
Published 2025“…The APF algorithm, based on the combination of attractive and repulsive potential functions, is modeled and simulated in MATLAB to guide UAVs toward target destinations while avoiding obstacles. …”
Get full text
Get full text
Get full text
Article -
14
Comparison of DSR, AODV and DSDV routing protocols in mobile ad-hoc networks: A survey
Published 2014“…A mobile ad hoc network (MANET) is a collection of mobile nodes that is connected through a wireless medium forming rapidly changing topologies.Mantes are infrastructure less and can be set up anytime, anywhere.We have conducted survey of protocol properties of various MANET routing algorithms and analyzed them.The routing algorithms considered are classified into three categories proactive (table driven) , reactive (on demand) and Hybrid protocol.The algorithms considered are Dynamic Source Routing (DSR), Ad-hoc On-Demand Distance Vector Routing (AODV) and Destination sequence Vector (DSDV) have been proposed to solve the multi hop routing problem in Ad-hoc networks.The comparison among three routing protocols are based on the various protocol property parameters such as Routing overhead, packet delivery ratio, end-to-end delay, path optimality, and throughput are some metrics commonly used in the comparisons.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Analysis On QOS Parameters To Predict Http Response
Published 2017“…Therefore, the real live world web service label data uses to evaluate the focus parameters using classification machine learning algorithms to process the data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…Multi-Instance Broker Scheduling Algorithm (MiBSA) has been proposed as a new scheduling algorithm to get rid of the drawback from the iHLBA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…Then, timetabling process is performed to identify a set of departure times at both origin and destination based on predefined parameters. The multiobjective set covering model is used by including some real-world restrictions to find number of buses and drivers as it can represent the problem clearly for implementation. …”
Get full text
Get full text
Thesis -
18
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…It is evident from the result that the proposed algorithm able to produced better result.…”
Get full text
Get full text
Thesis -
19
Performance evaluation of manet in presence of black hole nodes
Published 2017“…In this type of attack, the black hole node uses the maximum destination sequence number to lure the sender node, to send packets via the shortest path, so that it will drop or alter the packets intentionally instead of sending them to the destination. …”
Get full text
Get full text
Thesis -
20
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…The scheme will be useful in a various scenario of IoT environment where data is sent from unattended nodes to the destination known as a sink or receiver.…”
Get full text
Get full text
Thesis
