Search Results - (( programming model protocol algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- protocol algorithm »
- application mining »
- java application »
- mining algorithm »
- model protocol »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Enhancing problem-solving skills of novice programmers in an introductory programming course
Published 2023Article -
8
Video traffic analysis on Unifi broadband network / Laina Sofia Mahamad
Published 2017“…Thirdly, to identify best traffic model based on fitted model in developing network traffic bandwidth control algorithms. …”
Get full text
Get full text
Thesis -
9
Effects of Authentication of Users in Mobile Internet Protocol Version 6
Published 2004“…In this thesis, a user authentication program is modeled and simulated using Network simulator2 (NS2). …”
Get full text
Get full text
Thesis -
10
A protocol for developing a classification system of mosquitoes using transfer learning
Published 2022“…This protocol target on the domain expert such as entomologist and public health practices to develop their own model to solve the task of mosquito/insect classification.…”
Get full text
Get full text
Get full text
Article -
11
New synchronization protocol for distributed system with TCP extension
Published 2013“…After embedding the presented solution, a new protocol is created and applied. Thus, the new protocol is available to the communicating packets across all computer networks. …”
Get full text
Get full text
Thesis -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
13
A hybrid ANN for output power prediction and online monitoring in grid-connected photovoltaic system / Puteri Nor Ashikin Megat Yunus
Published 2023“…Improved Fast Evolutionary Programming (IFEP), Evolutionary Programming- Dolphin Echolocation Algorithm (EPDEA) and Evolutionary Programming-Firefly Algorithm (EPFA). …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Asynchronous point to point FSK- FM radio telemetry system with data encryption for monitoring environmental conditions / Shuhaimi Shamsuddin
Published 2003“…The data collected at RTS site are encrypted prior to transmission to the BTS by employing the One Time Pad (OTP) and Caesar Cipher algorithms. Serial asynchronous transmission was used as data communication protocol via RS232 port. …”
Get full text
Get full text
Thesis -
17
-
18
IoT based IMU sensor network for human arm pose estimation / Jahangir Hassan Khan
Published 2019“…The sensor node will transfer data to a computer via Wi-Fi using a custom designed network protocol. A multi-threaded program running on the computer will perform Forward Kinematics on the wirelessly transferred data using an arm model created using the Denavit-Hartenberg convention. …”
Get full text
Get full text
Get full text
Thesis -
19
An innovative approach of blending security features in energy-efficient routing for a crowded network of wireless sensors
Published 2014“…Wireless sensor networks (WSN) are emerging as both an important new tier in the IT (information technology) ecosystem and a rich domain of active research involving hardware and system design, networking, distributed algorithms, programming models, data management, security, and social factors [1,2]. …”
Get full text
Get full text
Get full text
Book Chapter -
20
Recent advancement of energy internet for emerging energy management technologies: Key features, potential applications, methods and open issues
Published 2024“…This article also explains the energy internet methods related to different programming approaches, artificial intelligence, and optimization algorithms for achieving granted reliability and enabling a decentralized energy market with a two-way energy flow. …”
Review
