Search Results - (( java implementation mining algorithm ) OR ( using case protocol algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- protocol algorithm »
- mining algorithm »
- case protocol »
- using case »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017“…Thus, smart protocol algorithm is developed to replace the previous system. …”
Get full text
Get full text
Monograph -
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
9
Reliable low power network protocol in IoT for agriculture field
Published 2024“…Existing research in energy efficient network protocols have problems with reliability or weaknesses that make them unsuitable for direct use in agriculture use cases. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…To facilitate communication within the network, a routing protocol is used to dis- cover routes between nodes. …”
Get full text
Get full text
Thesis -
11
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…This is an extension to AMTree Protocol. The results from experiments show that handoff latency using the new algorithms is much lower than using AMTree handoff procedure in both cases, i.e. when the source connects to a subscribed base station or not subscribed base station. …”
Get full text
Get full text
Thesis -
12
Hypertension Among Dental Patients: A Single Institution Experience And Development Of A Working Clinical Algorithm For Dental Practitioners
Published 2026journal::journal article -
13
The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2010“…In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. …”
Get full text
Get full text
Article -
14
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
15
Embedded Ethernet System For Real-Time Communication
Published 2018“…The Ethernet network model is used to analyze the performance of the backoff algorithm in a different number of nodes. …”
Get full text
Get full text
Monograph -
16
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…The survey concluded that protocol designers must focus on the development and implementation of fire-adaptive routing protocols, incorporating optimal fault tolerance routing algorithms that adapt seamlessly to unforeseen environmental changes, including fire incidents. …”
Article -
17
-
18
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
Published 2013“…Secondly, to increase the efficiency of EBA-15.4MAC algorithm, we propose a new scheme to resolve the problem of access collision arising from the small number of backoff exponent used by CSMA-CA. …”
Get full text
Get full text
Thesis -
19
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…A synchronization model is presented with the aid of the implemented Contiki's implicit network time synchronization scheme. Finally, a case study of a WSN-based SHM system using developed embedded data filtering and transmission algorithms to reduce data communication is performed and taken place on a concrete beam at Civil Engineering Structure Laboratory, UPM. …”
Get full text
Get full text
Thesis -
20
Clustering network traffic utilization
Published 2013“…Classification of network traffic using distinctive characteristic application is not ideal for P2P and HTTP protocols. …”
Get full text
Get full text
Article
