Search Results - (( protocol distributed systems algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- distributed systems »
- application mining »
- systems algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…This technique provides high data availability and increases the performance of the distributed systems. In recent years, the number of distributed nodes has become very large in Grid computing system. …”
Get full text
Get full text
Thesis -
4
New synchronization protocol for distributed system with TCP extension
Published 2013“…Process management is a fundamental problem in distributed systems. It is fast becoming a major performance and design issue for concurrent programming on modern architectures and for the design of distributed systems. …”
Get full text
Get full text
Thesis -
5
Efficient access of replicated data in distributed database systems
Published 2001“…Specifically, this thesis present a new protocol called Three Dimensional Grid Structure (TDGS) protocol, to manage data replication in distributed database systems (DDS). …”
Get full text
Get full text
Thesis -
6
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
7
Scheduled activity energy-aware distributed cluster- based routing algorithm for wireless sensor networks with non-uniform node distribution
Published 2014“…It makes the cluster-based routing protocols less efficient. Energy Aware Distributed Clustering (EADC) is one of the cluster-based routing protocol proposed for networks with non-uniform node distribution, which can effectively balance the energy consumption among the nodes. …”
Get full text
Get full text
Thesis -
8
-
9
Enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure
Published 2014“…This research is introducing an enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. …”
Get full text
Get full text
Get full text
Article -
10
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
Dynamic object replica placement using underlying routing protocols: ensuring the reliability
Published 2013“…Object replication is an unavoidable phenomenon in distributed systems to address the issues of size, administrative and resources scalability. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
13
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…The performance of the proposed routing algorithm is demonstrated through MATLAB. Based on the proposed system, to find the secure and optimal path while aiming at providing trust in IoT environment, the average energy consumption is minimized by nearly 50% even as the number of nodes has increased, as compared with the conventional ACO algorithm, a current ant-based routing algorithm for IoT-communication, and a present routing protocol RPL for IoT.…”
Get full text
Get full text
Get full text
Article -
14
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
15
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
Published 2018“…We propose the enhanced tight finite key scheme for quantum key distribution (QKD) protocol to authenticate multi-party system in cloud infrastructure. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
Encryption method for SCADA security enhancement
Published 2014“…Based on detail SCADA security analysis, the cryptography techniques have been adopted to enhance the security of these critical systems. The proposed security solutions takes novel approach to implement the best security performance cryptography algorithms included AES, RSA and SHA-2, as a security layer within distributed network protocol (DNP3) stack. …”
Get full text
Get full text
Get full text
Article -
19
Dynamic replication algorithm in data grid: Survey
Published 2008Get full text
Get full text
Get full text
Book Section -
20
CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK
Published 2023text::Thesis
