Search Results - (( service application testing algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- service application »
- application testing »
- application mining »
- testing algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
-
9
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Significant growths of subsystems are visible especially with new services, applications and devices in smart home environment. …”
Get full text
Get full text
Thesis -
10
-
11
Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi
Published 2015“…The solutions have then been significantly improved by the algorithms. In addition, travel and service times between customers may not be deterministic in real life applications. …”
Get full text
Get full text
Get full text
Thesis -
12
Dynamic Feedback Flow Control Algorithms for Unicast and Multicast Available Bit Rate Service in Asynchronous Transfer Mode Networks
Published 2000“…In particular, the ABR service has been approved to use the bandwidth left by CBR and VBR services, which is ideal for data applications and can perform well for real-time applications with the appropriate implementation. …”
Get full text
Get full text
Thesis -
13
Development Of Motion Planer And Navigation System For An Office Assistant Robot
Published 2021“…Next, the localization of robot was based on the LiDAR sensor and rotary encoder with AMCL algorithm. In this research the global planners, A* and Dijkstra algorithm and local planners, DWA and TEB algorithms were implemented and tested on the robot in in simulation and a real environment. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
An optimal tasks scheduling algorithm based on QoS in cloud computing network
Published 2017“…The simulation tool used for testing the algorithm is WorkflowSim. We tested averages of execution time span of the proposed algorithm for 10 running times with 200-1000 tasks in 50 or 100 VMs. …”
Get full text
Get full text
Thesis -
15
A hybrid algorithm for improving the quality of service in MANET
Published 2018“…The routing feature of the MANET is a stand-alone multi-hop mobile network that can be utilized in many real-time applications. Therefore, identifying paths that ensure high Quality of Service (QoS), such as their topology and applications is a vital issue in MANET. …”
Get full text
Get full text
Article -
16
Optimized crossover genetic algorithm for vehicle routing problem with time windows
Published 2010“…Results: We tested our algorithm with benchmark instances and compared it with some other heuristics in the literature. …”
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
-
20
RSA algorithm performance in short messaging system exchange environment
Published 2011“…This sensitive information should be totally secure and reliable to exchange.This urgent need for secure SMS, led to drive for RSA implementation, which is considered one of the strongest algorithms in security since we are going to bring big security into small device.Our main goal in this project is to design an experimental test bed application in order to use this application in evaluating the performance of RSA. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
