Search Results - (( software defined process algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- process algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Securing password authentication using MD5 algorithm
Published 2014Get full text
Get full text
Undergraduates Project Papers -
5
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Automatic generation of user-defined test algorithm description file for memory BIST implementation
Published 2022“…Memory built-in self-test (BIST) is a widely used technique to allow the self-test and self-checking of the embedded memories on chips after the fabrication process. It can be used by implementing a standard testing algorithm available in the EDA tool library or a user-defined algorithm (UDA). …”
Get full text
Get full text
Get full text
Article -
7
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
Modem Recognition Algorithm for Software Defined Radio Base Station
Published 2004“…To address this issue, Software Defined Radio (SDR) plays an important role to bridge the hardware limitation. …”
Get full text
Get full text
Thesis -
10
Cohesive token passing algorithm utilizing software agents
Published 2010“…In this paper, the limitation of Token Ring algorithm for IP networks in the context of intelligent processing has been researched extensively. …”
Get full text
Get full text
Article -
11
Design Of Multi-Modulation Baseband Modulator And Demodulator For Software Defined Radio
Published 2011“…In contrast to hardware-based radio that only delivers single communication service using particular standard, the software defined radio (SDR) provides a highly reconfigurable platform to integrate various functions for multi-modulation, multiband and multi-standard wireless communication systems. …”
Get full text
Get full text
Thesis -
12
Implementation Of Hardware Software Partitioning In Embedded System
Published 2018“…The parameter setting is used for both algorithms is 15 number of task/node, 500 maximum number of iteration, 100 no of particles/population size and the pre-defined hardware and software area and execution time for each task as the input of the algorithms. …”
Get full text
Get full text
Monograph -
13
Formulation of Mandatory Task Algorithm Using Task Prioritization Technique
Published 2023Conference Paper -
14
The concept of wound healing algorithm
Published 2023Get full text
Get full text
Get full text
Get full text
Proceedings -
15
Environmental Assessment of Alkali-Catalysed Biodiesel Process Using War Algorithm
Published 2013“…The process simulation was conducted by using Aspen Plus software simulator since it can optimize the simulation process. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Distributed generation allocation to reduce losses and improve voltage profile genetic algorithm: article
Published 2010“…I used Newton Raphson for load flow algorithm and composed it with Genetic Algorithm. The suggested method is programmed under MATLAB software. …”
Get full text
Get full text
Article -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
18
-
19
Path Selection With Critical Switch-Aware For Software Defined Networking
Published 2021“…The flexibility of software defined network come at the cost of network rule configuration and load balancing during path selection. …”
Get full text
Get full text
Conference or Workshop Item -
20
