Search Results - (( java implementation mining algorithm ) OR ( using network graph algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- mining algorithm »
- graph algorithm »
- network graph »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…This study employs use Random Forest algorithm to identify and forecast attacks to dynamically locate the attack location in the network for attack graph analysis. …”
Get full text
Get full text
Get full text
Thesis -
6
Evaluation of Visual Network Algorithms on Historical Documents
Published 2020“…The framework has been used to evaluate three graph layout and three graph clustering algorithms on the historical SAGA dataset. …”
Get full text
Get full text
Get full text
Thesis -
7
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…The use of network technologies has increased in recent years. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…The evaluation of the performance of these attack graph models using IoT networks or devices as case studies is also emphasized. …”
Review -
9
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
A hybrid algorithm for finding shortest path in network routing.
Published 2009“…This wave gives an O( N ) steps quantum algorithm for identifying that record, where was used classical Dijkstra’s algorithm for finding shortest path problem in the graph of network and implement quantum search. …”
Get full text
Article -
11
A GreedyZero algorithm to minimise the conflicts in an Optical Multistage Interconnection Network
Published 2014“…In this paper, we have proposed a new algorithm to minimise the number of conflicts of OMINs using the greedy graph colouring and Zero algorithm. …”
Get full text
Get full text
Get full text
Article -
12
Application of computer based simulation in gas network system using graph theory algorithms and numerical methods
Published 2007“…This is causing the other graph theory algorithms remain least known to users. …”
Get full text
Get full text
Thesis -
13
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…For the attack graph analysis, the random forest algorithm was used to detect, predict, and dynamically ascertain the attack location in the network. …”
Get full text
Get full text
Get full text
Article -
14
A comparative study of greedy algorithms and dynamic programming in road network / Nuralya Sofea Hairulanuar
Published 2024“…The research assesses the efficiency, accuracy, and appropriateness of these algorithms for different kinds of networks, with a specific focus on their use in optimizing travel routes within the road network of Terengganu, Malaysia. …”
Get full text
Get full text
Thesis -
15
A multi-view clustering algorithm for attributed weighted multi-edge directed networks
Published 2022“…Graph clustering acts as a critical topic for solving decision situations in networks. …”
Get full text
Get full text
Article -
16
An analysis of the effect of heterogeneously distributed inertia constant in generation mix power system by using the graph theory and Dijkstra’s Algorithm
Published 2023“…The graph theory network gives the idea about the distance between the nodes and it is helpful to find the share of power from the generating sources. …”
Get full text
Get full text
Get full text
Article -
17
Spanning Tree Transformation of Connected Graph into Single-Row Network
Published 2010“…The spanning tree that is produced from the connected graph is then transformed into single-row network using Tree Sequence Modeling (TSM). …”
Get full text
Get full text
Conference or Workshop Item -
18
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
Published 2012“…Graph colouring is a useful algorithm for channel allocation on wireless local area network (WLAN). …”
Get full text
Get full text
Conference or Workshop Item -
19
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
