Search Results - (( java implementation mining algorithm ) OR ( programmes service using algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- using algorithm »
- service using »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
8
Prioritisation Assessment and Robust Predictive System for Medical Equipment: A Comprehensive Strategic Maintenance Management
Published 2024journal::journal article -
9
Implementation Of Elevator Control System Using Raspberry PI
Published 2018“…Instead of using programmable logic controller, a Raspberry Pi was chosen to act as the master controller to perform the logic algorithm that control the movement of the elevator. …”
Get full text
Get full text
Monograph -
10
Design of an advanced encryption standard crypto-processor core for field programmable gate array implementation
Published 2006“…The proposed AES Crypto-Processor accelerates the AES algorithm in reconfigurable Field Programmable Gate Arrays (FPGA). …”
Get full text
Get full text
Thesis -
11
Solving fuzzy-facilities layout problem using genetic algorithm
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
12
FPGA Implementation of Emergency Door Car Entry System
Published 2008“…Emergency door car entry system can be implemented using Field Programmable Gate Array (FPGA) board. …”
Get full text
Learning Object -
13
Fiber-Wireless testbed using software defined radio for protocol and algorithm testing
Published 2023“…Researchers worldwide are still developing experimental works for improvement on the network reliability, quality-of-services and security. Almost all recently proposed testbed designed for FiWi are using hardware that lacks in programmability feature, making it challenging to implement any protocols and algorithms. …”
Article -
14
An Intelligence Technique For Denial Of Service (Dos) Attack Detection
Published 2017“…Therefore, this paper concern about Denial of Service (DoS) attack, detection using Neural Network. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
An intelligence technique for denial of service (DoS) attack detection
Published 2018“…Therefore, this paper concern about Denial of Service (DoS) attack, detection using Neural Network. …”
Get full text
Get full text
Get full text
Article -
16
SDN-based VANET routing: A comprehensive survey on architectures, protocols, analysis, and future challenges
Published 2024“…Consequently, the software-defined networking (SDN) paradigm offers unique features such as programmability and flexibility to enhance vehicular network performance and management and meet the quality of services (QoS) requirements of various VANET services. …”
Get full text
Get full text
Get full text
Article -
17
Controller placement problem in the optimization of 5G based SDN and NFV architecture
Published 2021“…Extensive computations utilizing MATLAB 2018a on the Intel Core i7/Gen 10 processor and 16 GB of RAM are used to evaluate the algorithm efficacy. According to the blueprint of our heuristic method, the allocation and the optimum number of controllers under an effective decentralized policy could achieve higher efficiency. …”
Get full text
Get full text
Thesis -
18
SDN-Based VANET Routing: A Comprehensive Survey on Architectures, Protocols, Analysis, and Future Challenges
Published 2025“…Consequently, the software-defined networking (SDN) paradigm offers unique features such as programmability and flexibility to enhance vehicular network performance and management and meet the quality of services (QoS) requirements of various VANET services. …”
Article -
19
Maximizing Mobile Communication Efficiency with Smart Antenna Systems using Beam forming and DOA Algorithms
Published 2024Conference Paper -
20
Cooperative spectrum sensing based on machine learning in cognitive radio vehicular network / Mohammad Asif Hossain
Published 2022“…The selection would be made based on the hybrid machine learning (ML) algorithm. A fuzzy-based Naive Bayes algorithm has been used in this case. …”
Get full text
Get full text
Get full text
Thesis
