Search Results - (( protocol distributed databases algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- distributed »
- databases »
-
1
Efficient access of replicated data in distributed database systems
Published 2001“…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
Get full text
Get full text
Thesis -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
Synchronization algorithm for remote heterogeneous database environment
Published 2015“…While fulfilling the set objectives, our proposed algorithm managed to provide an efficient data exchange mechanism for distributed databases using 3 steps for proper consistency and synchronization along with network utilization when tested with three different databases. …”
Get full text
Get full text
Article -
5
New synchronization protocol for distributed system with TCP extension
Published 2013“…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
Get full text
Get full text
Thesis -
6
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
7
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
10
-
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
12
Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach
Published 2022“…In combination, mammogram quantification creates a long-standing focus area. The algorithm proposed must reduce complexity and target data points distributed in iterative, and boost cluster centroid merged into a single updating process to evade the large storage requirement. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
-
14
Internet of Things-based Home Automation with Network Mapper and MQTT Protocol
Published 2025Article -
15
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…Cloud computing is Internet-based computing, where information, resources, and softwares are shared through distributed cloud server or Cloud Data Storage (CDS). …”
Get full text
Get full text
Thesis -
16
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…Businesses have adopted certain algorithms that can help them to extract information from the Internet to discover potentially significant patterns inherent in the database, which can help the online marketing strategy. …”
Get full text
Get full text
Conference or Workshop Item -
17
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
Get full text
Get full text
Thesis
