Search Results - (( software communication based algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- software communication »
- communication based »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…The proposed algorithm was developed based on 8th order statistical moment and the technique was chosen based on the research work done by Keith et al [15]. …”
Get full text
Get full text
Thesis -
8
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…In a conclusion, SEM prototype and adaptive communication data transfer algorithm with a combination of the three communication will be another method to solve a single communication problem of SM and suitable in residential location that offered the proposed communication infrastructure.…”
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
10
-
11
Performance of MIMO space-time coded system and training based channel estimation for MIMO-OFDM system
Published 2006“…Secondly, it has focused on training based channel estimation algorithm for MIMO-OFDM system. …”
Get full text
Get full text
Thesis -
12
Comparative Analysis of Neighborhood based Meta-heuristic Algorithms for MC/DC Test Data Generation
Published 2016Get full text
Get full text
Conference or Workshop Item -
13
-
14
Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Article -
15
Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail
Published 2014“…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
Get full text
Get full text
Thesis -
16
Cohesive token passing algorithm utilizing software agents
Published 2010“…The results acquired validated the improved results of the new software agent based implementation. The performance metrics studied were average delay and average buffer utilization. …”
Get full text
Get full text
Article -
17
Design Of Multi-Modulation Baseband Modulator And Demodulator For Software Defined Radio
Published 2011“…In contrast to hardware-based radio that only delivers single communication service using particular standard, the software defined radio (SDR) provides a highly reconfigurable platform to integrate various functions for multi-modulation, multiband and multi-standard wireless communication systems. …”
Get full text
Get full text
Thesis -
18
Development of collision avoidance system for multiple autonomous mobile robots
Published 2023Article -
19
Enhancement of bluetooth security authentication using hash-based message authentication code (HMAC) algorithm
Published 2014“…This proposed protocol uses Hash-based Message Authentication Code (HMAC) algorithm with Secure Hash Algorithm (SHA-256). …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
