Search Results - (( java implementation mining algorithm ) OR ( program internet protocol algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- protocol algorithm »
- mining algorithm »
- program internet »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…Thus, it. is recommended that user authentication be applied to mobile Internet Protocol version 6 (IPv6) as a security measure. …”
Get full text
Get full text
Thesis -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
-
8
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Optimal forwarding routing protocol in ipv6-based wireless sensor network
Published 2009“…Currently, a popular routing network protocol in WSNs is not compatible with IP-Based network _and can not provide Internet connection. …”
Get full text
Get full text
Thesis -
10
Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad
Published 2017“…Results presents four top traffic protocols are identified which are Transmission Control Protocol (TCP), User Datagram Protocol (UDP) and Quick UDP Internet Connection (QUIC) protocol when streaming the videos in UNIFI network. …”
Get full text
Get full text
Thesis -
11
-
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
13
Enhancing problem-solving skills of novice programmers in an introductory programming course
Published 2023“…Internet protocols; Learning algorithms; Learning systems; Semantics; Teaching; Introductory programming; Introductory programming course; Problem solving skills; Programming exercise; Programming knowledge; Semi structured interviews; Students' behaviors; Traditional approaches; Students…”
Article -
14
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…This paper proposes an efficient approach to improve Rivest Shamir Adleman (RSA) algorithm using parallel technique. RSA public-key cryptosystem has been the most popular and interesting security technique for majority of applications such as internet protocols, secure internet acces and electronic commerce. …”
Get full text
Get full text
Get full text
Article -
15
Wireless controller area networking using token frame scheme
Published 2012Get full text
Get full text
Thesis -
16
-
17
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…It is efficacious to protecting the confidentiality and integrity of communication in Internet of Things (IoT) system. Wireless Sensor Network (WSN) is now an inevitable component of the Internet of Things (IoT), this integration creates new security challenges that exist between the sensor nodes and to the sink or internet host. …”
Get full text
Get full text
Thesis -
18
Recent advancement of energy internet for emerging energy management technologies: Key features, potential applications, methods and open issues
Published 2024“…This article also explains the energy internet methods related to different programming approaches, artificial intelligence, and optimization algorithms for achieving granted reliability and enabling a decentralized energy market with a two-way energy flow. …”
Review -
19
Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
Published 2004“…This approach nicely complements the existing peer-to-peer protocols and gives a limited disruption on current implementations. …”
Get full text
Get full text
Thesis -
20
IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan
Published 2019“…The Forward Kinematics approach has great advantage such as being easy to program and its faster computational speed, as compared to the conventional arm pose estimation algorithms. …”
Get full text
Get full text
Get full text
Thesis
