Search Results - (( pre processing protocol algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- protocol algorithm »
- application mining »
- java application »
- mining algorithm »
- pre processing »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Cohesive token passing algorithm utilizing software agents
Published 2010“…An enhanced Token Ring protocol governed by intelligent processing has been implemented in this paper. …”
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
An enhanced cluster head selection algorithm for routing in mobile AD-HOC network
Published 2017“…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
Get full text
Get full text
Thesis -
9
EEG-and MRI-based epilepsy source localization using multivariate empirical mode decomposition and inverse solution method
Published 2018“…The accuracy of ESL depends on all the stages of data processing including: head model reconstruction, signal pre-processing and inverse solution. …”
Get full text
Get full text
Thesis -
10
A protocol for developing a classification system of mosquitoes using transfer learning
Published 2022“…Transfer learning is a type of machine learning that is viable and durable in image classification with limited training images. This protocol aims to develop step-by-step procedure in developing a classification system with transfer learning algorithm for mosquito, we demonstrate the protocol to classify two species of Aedes mosquito - Aedes aegypti L. and Aedes albopitus L, but user can adopt the protocol for higher number of species classification. …”
Get full text
Get full text
Get full text
Article -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
-
13
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The industrial datasets are pre-processed, profiled and the abnormality is analyzed with DPI. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks
Published 2021“…The majority of the approaches follow heuristic-based protocol combined with various connected phases and processes, such as cluster formation, cluster head selection, and cluster maintenance. …”
Get full text
Get full text
Get full text
Thesis -
15
An e-voting application using cryptography technology
Published 2020“…The second is the relatively simple captcha (Completely Automated Public Turing test to tell Computers and Humans Apart). This process that requires users to enter a pre-determined code to authenticate users is not a robot. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…These results indi�cate that the proposed method can improve the RAN learning algorithm towards the large-scale stream data processing. …”
Get full text
Get full text
Thesis
