Search Results - (( using case protocol algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- protocol algorithm »
- application mining »
- java application »
- mining algorithm »
- case protocol »
- using case »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Developing A Control Protocol Algorithm For Stimulating The Street Light System
Published 2017“…Thus, smart protocol algorithm is developed to replace the previous system. …”
Get full text
Get full text
Monograph -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Reliable low power network protocol in IoT for agriculture field
Published 2024“…Existing research in energy efficient network protocols have problems with reliability or weaknesses that make them unsuitable for direct use in agriculture use cases. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Location-Based Approach for Route Maintenance in Dynamic Source Routing Protocol
Published 2008“…To facilitate communication within the network, a routing protocol is used to dis- cover routes between nodes. …”
Get full text
Get full text
Thesis -
10
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…This is an extension to AMTree Protocol. The results from experiments show that handoff latency using the new algorithms is much lower than using AMTree handoff procedure in both cases, i.e. when the source connects to a subscribed base station or not subscribed base station. …”
Get full text
Get full text
Thesis -
11
Hypertension Among Dental Patients: A Single Institution Experience And Development Of A Working Clinical Algorithm For Dental Practitioners
Published 2026journal::journal article -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
13
The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2010“…In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. …”
Get full text
Get full text
Article -
14
Improved tree routing protocol in zigbee networks
Published 2010“…ImpTR protocol uses an approach to select next hope depending on new algorithm and uses the same tree topology construction for distributing address to all sensor nodes in the network. …”
Get full text
Get full text
Thesis -
15
Embedded Ethernet System For Real-Time Communication
Published 2018“…The Ethernet network model is used to analyze the performance of the backoff algorithm in a different number of nodes. …”
Get full text
Get full text
Monograph -
16
Survey on Clustered Routing Protocols Adaptivity for Fire Incidents: Architecture Challenges, Data Losing, and Recommended Solutions
Published 2025“…The survey concluded that protocol designers must focus on the development and implementation of fire-adaptive routing protocols, incorporating optimal fault tolerance routing algorithms that adapt seamlessly to unforeseen environmental changes, including fire incidents. …”
Article -
17
-
18
Efficient back-off mechanism for IEEE 802.15.4 wireless sensor networks
Published 2013“…Secondly, to increase the efficiency of EBA-15.4MAC algorithm, we propose a new scheme to resolve the problem of access collision arising from the small number of backoff exponent used by CSMA-CA. …”
Get full text
Get full text
Thesis -
19
High-throughput and energy-efficient Contiki MAC layer scheme in IEEE 802.15.4 for structural health monitoring
Published 2021“…A synchronization model is presented with the aid of the implemented Contiki's implicit network time synchronization scheme. Finally, a case study of a WSN-based SHM system using developed embedded data filtering and transmission algorithms to reduce data communication is performed and taken place on a concrete beam at Civil Engineering Structure Laboratory, UPM. …”
Get full text
Get full text
Thesis -
20
Clustering network traffic utilization
Published 2013“…Classification of network traffic using distinctive characteristic application is not ideal for P2P and HTTP protocols. …”
Get full text
Get full text
Article
