Search Results - (( security application clustering algorithm ) OR ( java implementation mining algorithm ))
Search alternatives:
- application clustering »
- implementation mining »
- security application »
- java implementation »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
3
Scalable approach for mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data we study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
4
Mining association rules from structured XML data
Published 2009“…Many techniques have been proposed to tackle the problem of mining XML data. We study the various techniques to mine XML data and yet We presented a java based implementation of FLEX algorithm for mining XML data.…”
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
7
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
-
10
Parallelizing Algorithm For Object Recognition Based On Edge Detection On Sunfire Cluster.
Published 2007Get full text
Get full text
Conference or Workshop Item -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
12
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…Owing to the enhanced performance of the proposed solutions, particularly in terms of security, scalability, and complexity, it paves the way for the implementation of decentralized security in IoT applications within the realms of healthcare and agriculture.…”
Get full text
Get full text
Thesis -
13
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the authentication of the devices in the network. …”
Get full text
Get full text
Article -
14
-
15
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. …”
Review -
16
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Based on the above components and circumstances, many studies have been performed on data clustering problems. Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
17
Unsupervised Anomaly Detection with Unlabeled Data Using Clustering
Published 2005Get full text
Get full text
Conference or Workshop Item -
18
Anomaly-based intrusion detection through K-means clustering and naives Bayes classification
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Anomaly-based intrusion detection through K-Means clustering and Naives Bayes classification
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis
