Search Results - (( java implementation mining algorithm ) OR ( using message drops algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- message drops »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
Get full text
Get full text
Get full text
Thesis -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…Using the NIPT, the packet drop is decreased and chosen the best route is free from the wormhole. …”
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
10
Routing strategies and buffer management in delay tolerant networks
Published 2016“…This study presents a comprehensive survey on DTN and brief outlines of popular routing protocols in DTN.This paper also highlights the buffer management technologies that are used in DTN.Where an efficient buffer management scheme is required to choose at each step which of the messages should be transmitted in case of limited bandwidth and which of the messages should be dropped when the buffer is full.Regardless of which routing algorithms used.…”
Get full text
Get full text
Get full text
Article -
11
Performance Enhancement of Routing Protocols in Mobile Wireless Ad-Hoc Networks Using Fuzzy Reasoning Algorithm
Published 2006“…Finally, in the last method fuzzy reasoning is used for network congestion estimation and estimating time to start dropping incoming packets. …”
Get full text
Get full text
Thesis -
12
VANET SECURITY FRAMEWORK FOR LOW LATENCY SAFETY APPLICATIONS
Published 2012“…However, these solutions still do not satisfy the existing safety applications standard or have larger message size due to increased message drop ratio. …”
Get full text
Get full text
Thesis -
13
Simulation of multiple mobile robots using JMonkey Engine
Published 2016Get full text
Get full text
Undergraduates Project Papers -
14
TDMA scheduling analysis of energy consumption for iot wireless sensor network
Published 2019“…The algorithm use time division multiplexing algorithm together with hello message to allocate the neighbors and their energy level to find the best way to communicate and reduce packet drop, less signal interference and increase throughput. …”
Get full text
Get full text
Thesis -
15
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…The third algorithm, named as Pro-Active Intelligence algorithm has inspired autonomous action triggering for each event interoperation, using a control action statement that is generated by SOAP packets required for joint execution of tasks among heterogeneous subsystems. …”
Get full text
Get full text
Thesis
