Search Results - (( things adaptation optimization algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- adaptation optimization »
- application mining »
- things adaptation »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Genetic algorithm based adaptive offloading for improving IoT device communication efficiency
Published 2019“…This manuscript introduces genetic algorithm based adaptive offloading (GA-OA) for effective traffic handling in IoT-infrastructure-cloud environment. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Adaptive medium access control protocol of Wifi-Halow for home machine-to-machine network
Published 2019“…Therefore, work can be done on these aspects to improve its performance and introduce a new dimension of adaptation. Firstly, this work proposed a novel algorithm known as probability-based opportunity dynamic adaptation (PODA) of CW for home M2M network. …”
Get full text
Get full text
Thesis -
8
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
10
-
11
-
12
Optimal Sensing for Opportunistic Spectrum Access in Cognitive Radio
Published 2010“…The derivation of greedy approach proves that sensing problem can be solved either optimally or approximate the optimal solution. Computer simulation is used to evaluate the performances both of optimal and sub optimal strategy.…”
Get full text
Get full text
Article -
13
Design and implementation of a deep learning based hand gesture recognition system for Rehabilitation Internet-Of-Things (RIOT) environments using MediaPipe
Published 2025“…The methodology involves the integration of MediaPipe for detecting hand landmarks and adaptive sensitivity algorithms to ensure reliable recognition across different environments, such as varying lighting and hand positions. …”
Get full text
Get full text
Get full text
Article -
14
Towards Autonomous Farming -A Novel Scheme based on Learning to Prediction and Optimization for Smart Greenhouse Environment Control
Published 2022“…Proposed learning-based optimization scheme results are compared with two other schemes i.e., baseline scheme and optimization scheme. …”
Get full text
Get full text
Article -
15
Towards Autonomous Farming -A Novel Scheme based on Learning to Prediction and Optimization for Smart Greenhouse Environment Control
Published 2022“…Proposed learning-based optimization scheme results are compared with two other schemes i.e., baseline scheme and optimization scheme. …”
Get full text
Get full text
Article -
16
Toward Autonomous Farming - A Novel Scheme Based on Learning to Prediction and Optimization for Smart Greenhouse Environment Control
Published 2022“…Proposed learning-based optimization scheme results are compared with two other schemes, i.e., baseline scheme and optimization scheme. …”
Get full text
Get full text
Article -
17
Improved K-means clustering and adaptive distance threshold for energy reduction in WSN-IoTs
Published 2025“…This study introduces an enhanced energy aware clustering approach that combines an improved K-Means algorithm with an adaptive distance threshold to optimize relay node selection and cluster formation. …”
Get full text
Get full text
Get full text
Article -
18
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
19
Advanced solar tracking system with temperature control and real-time monitoring
Published 2025“…Leveraging the Wokwi simulation platform, the Arduino microcontroller processes sensor inputs and executes intelligent decision-making algorithms. These algorithms dynamically control the servo motor, relay module, and LCD display, adapting the system based on environmental conditions. …”
Get full text
Get full text
Book Section -
20
A secure trust aware ACO-Based WSN routing protocol for IoT
Published 2022“…Bio-inspired mechanisms are shown to be adaptive to environmental variations, robust and scalable, and require less computational and energy resources for designing secure routing algorithms for distributed optimization. …”
Get full text
Get full text
Get full text
Article
