Search Results - (( java implementation mining algorithm ) OR ( using robust protocol algorithm ))
Search alternatives:
- implementation mining »
- java implementation »
- protocol algorithm »
- mining algorithm »
- robust protocol »
- using robust »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
8
OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH
Published 2014“…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
Get full text
Get full text
Final Year Project -
9
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. …”
Get full text
Get full text
Student Project -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
11
FSM-Gear weight-based energy-efficient protocol for illegal logging monitoring using firefly synchronization
Published 2022“…The optimum network model has resulted in five cluster heads network clustering. This model was used to examine and test the FSM- GEAR Protocol and the previous M-GEAR. …”
Get full text
Get full text
Get full text
Thesis -
12
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
Get full text
Get full text
Thesis -
13
Reliable Path Selection Packet Forwarding Routing Protocol for Vehicular Adhoc Networks
Published 2019“…One of the crucial issues comprise of the design of scalable routing algorithms that are robust to rapid topology changes and frequent link disconnections caused by high mobility of vehicles. …”
Get full text
Get full text
Get full text
Thesis -
14
Enhance the robustness of secure Rijndael key expansion function based on increment confusion and diffusion bits
Published 2017Get full text
Get full text
Conference or Workshop Item -
15
Benchmarking Robust Machine Learning Models Under Data Imperfections in Real-World Data Science Scenarios
Published 2026“…Performance was evaluated using predictive metrics, robustness degradation rate (RDR), and computational efficiency, with statistical validation across repeated experimental runs. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
A new machine learning-based hybrid intrusion detection system and intelligent routing algorithm for MPLS network
Published 2023“…Next, the ML-based routing algorithm is compared to the conventional routing algorithm, Routing Information Protocol version 2 (RIPv2). …”
text::Thesis -
17
Rogue access point detection and tracking system using trilateration algorithm
Published 2023Get full text
Get full text
Book Section -
18
-
19
Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks
Published 2012“…Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
Get full text
Get full text
Thesis -
20
Node status detection and information diffusion in router network using scale-free network
Published 2014“…In this paper we have used the concept of scale-free network theory to design a more robust data dissemination approach which can be used in one dynamical Autonomous Systems (AS) to know the appearance and disappearance of nodes, and speedily propagate the information to all nodes in the routers network. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
