Search Results - (( protocol distributed search algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- distributed search »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
General purpose search and classification algorithms for distributed information access
Published 2000“…Users have to visit each URLs even though the page does not suit their requests.Therefore, it is vital to provide efficient and timely Internet search algorithm to ensure the success of distributed services, particularly to facilitate the current and future applications of national information superhighway. …”
Get full text
Get full text
Conference or Workshop Item -
4
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
A trust aware secure ant colony optimization based routing algorithm for Internet of Things
Published 2023“…For wireless sensor network (WSN) integrated dynamic IoT networks, this paper presents a trust-aware secure Ant colony optimization (ACO)-based routing algorithm to provide security while searching for an energy-efficient optimal routing path. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
-
11
Efficient hybrid flooding scheme for ad-hoc on-demand distance vector routing protocol in MANET
Published 2014“…Another prominent approach is the Dominant Pruning (DP) which is a distributed dominating set algorithm developed to alleviate the impact of flooding in mobile ad-hoc networks. …”
Get full text
Get full text
Get full text
Thesis -
12
Distributed joint power control, beamforming and spectrum leasing for cognitive two-way relay networks
Published 2017“…In the first part of the thesis, distributed power control and beamforming algorithm is proposed in which users operating in the underlay mode can strategically adapt their power levels and maximize their own utilities. …”
Get full text
Get full text
Thesis -
13
Software agent as an effective tool for managing the Internet of thing data complexity
Published 2017“…Today the Internet serves many purposes, from social interaction to information search and conducting business activities to smart connectivity. …”
Get full text
Get full text
Conference or Workshop Item -
14
Incremental learning for large-scale stream data and its application to cybersecurity
Published 2015“…In Chapter 4, we propose a fast Distributed Denial of Service (DDoS) backscat�ter detection system to detect DDoS backscatter from a combination of protocols and ports other than the following two labeled packets: Transmission Control Protocol (TCP) Port 80 (80/TCP) and User datagram Protocol (UDP) Port 53 (53/UDP). …”
Get full text
Get full text
Thesis
