Search Results - (( java implementation modified algorithm ) OR ( knowledge based streaming algorithm ))
Search alternatives:
- implementation modified »
- java implementation »
- streaming algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
A study of density-grid based clustering algorithms on data streams
Published 2011Get full text
Get full text
Conference or Workshop Item -
3
On density-based data streams clustering algorithms: A survey
Published 2017“…Recently, a lot of density-based clustering algorithms are extended for data streams. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…Data stream clustering plays an important role in data stream mining for knowledge extraction. …”
Get full text
Get full text
Thesis -
5
A buffer-based online clustering for evolving data stream
Published 2019“…In this study, we present a fully online density-based clustering algorithm called buffer-based online clustering for evolving data stream (BOCEDS). …”
Get full text
Get full text
Get full text
Article -
6
An adaptive density-based method for clustering evolving data streams / Amineh Amini
Published 2014“…This study proposes a density-based algorithm for clustering evolving data streams. …”
Get full text
Get full text
Get full text
Thesis -
7
An Evolutionary Stream Clustering Technique for Outlier Detection
Published 2020“…Nearly all traditional density-based clustering algorithms can be extended to the latest ones for data streams study purposes. …”
Get full text
Get full text
Conference or Workshop Item -
8
A Clustering Algorithm for Evolving Data Streams Using Temporal Spatial Hyper Cube
Published 2023“…TSHC when added to Buffer?based Online Clustering for Evolving Data Stream (BOCEDS) results in a superior evolving data stream clustering algorithm. …”
Article -
9
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…Lately, a fully online buffer-based clustering algorithm for handling evolving data streams (BOCEDS) was developed. …”
Article -
10
Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things
Published 2022“…Thus, using neural network-based semi-supervised stream data learning is inadequate due to capture the changes in the distribution and characteristics of various classes of data while avoiding the effect of the outdated stored knowledge in neural networks (NN). …”
Get full text
Get full text
Thesis -
11
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
12
The Security Level Of Two Xored-based A5 Crypto System
Published 2024“…Five (5) statistical tests were used to test the strength of the algorithm. Both of the proposed modified XORed-based A5/1 algorithms successfully passed the five (5) statistical tests.…”
Article -
13
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
14
Hazard identification on fractionation column using rule based expert system
Published 2001“…The process-general knowledge which consists of rule-based expert system is developed from simulation result obtained from HYSIS process simulator. …”
Get full text
Get full text
Article -
15
-
16
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
17
Hyper-heuristic framework for sequential semi-supervised classification based on core clustering
Published 2020“…However, using neural network-based semi-supervised stream data learning is not adequate due to the need for capturing quickly the changes in the distribution and characteristics of various classes of the data whilst avoiding the effect of the outdated stored knowledge in neural networks (NN). …”
Get full text
Get full text
Get full text
Article -
18
A review on big data stream processing applications: contributions, benefits, and limitations
Published 2021“…Many techniques have been proposed and studied to handle big data and give decisions based on off-line batch analysis. Today, we need to make a constructive decision based on online streaming data analysis. …”
Get full text
Get full text
Get full text
Article -
19
Clustering for binary data sets by using genetic algorithm-incremental K-means
Published 2018“…For the purpose of this research, GA was combined with the Incremental Kmeans (IKM) algorithm to cluster the binary data streams. In GAIKM, the objective function was based on a few sufficient statistics that may be easily and quickly calculated on binary numbers. …”
Get full text
Get full text
Article -
20
Real-time anomaly detection using clustering in big data technologies / Riyaz Ahamed Ariyaluran Habeeb
Published 2019“…Based on the outcome of the analysis, this research proposed a novel framework namely real-time anomaly detection based on big data technologies (RTADBDT), along with supporting implementation algorithms. …”
Get full text
Get full text
Get full text
Thesis
