Search Results - (( using modification protocol algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- using modification »
- protocol algorithm »
- application mining »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
-
4
Amtree Protocol Enhancement by Multicast Tree Modification and Incorporation of Multiple Sources
Published 2008“…This thesis proposes some techniques to enhance the AMTree protocol. First we propose two algorithms to improve the handoff process in AMTree protocol. …”
Get full text
Get full text
Thesis -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
Performance analysis of AES (Advance Encryption Standard) in IPSec (Internet Protocol Security) / Nik Shahidah Afifi Md Taujuddin, Abdul Hanan Abdullah and Mohd Aizaini Maarof
Published 2006“…These algorithms are being used as encryption algorithm in Encapsulated Security Payload (ESP) protocol. …”
Get full text
Get full text
Conference or Workshop Item -
7
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
10
The delay with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2010“…In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the New-AIMD algorithm to measure the queue length and end-to-end delays and we will use the NCTUns simulator to get the results after make the modification of the mechanism. …”
Get full text
Get full text
Article -
11
A hybrid residue based sequential encoding mechanism with XGBoost improved ensemble model for identifying 5-hydroxymethylcytosine modifications
Published 2025“…Among the applied machine learning algorithms, the XGBoost ensemble model using the tenfold cross-validation test achieved improved results than existing state-of-the-art models. …”
Article -
12
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. We simulate the enhanced packet queuing algorithm using OMNET++. …”
Get full text
Get full text
Article -
13
Performance Comparison of Packet Queuing Algorithm in Wireless Networks
Published 2014“…The implementation consider the unfairness problem for the per flow throughput in IEEE 802.11 without the modification of the MAC protocol. We simulate the enhanced packet queuing algorithm using OMNET++. …”
Get full text
Get full text
Conference or Workshop Item -
14
Vehicular ad-hoc network (vanets) for electrical vehicle charging management
Published 2025text::Thesis -
15
Fast handover algorithm for hierarchical mobile IPv6 macro-mobility management
Published 2003“…Our design objective is to re-establish the communication traffic flow quickly and to minimize the service disruption delay that occnrs during handover process in a macro mobility environment. This handover algorithm is based on the modification of the HMIPv6 protocol using the multicast technique concept. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Efficiency and fairness of new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2011“…The NCTUns simulator is used to obtain the results after implementing the modifications to the mechanism.…”
Get full text
Get full text
Get full text
Article -
17
A new routing metric for DYMO protocol on mobile AD HOC network
Published 2013“…To overcome this problem, several important modifications to the routing protocol algorithms are then considered to operate better in networks. …”
Get full text
Get full text
Get full text
Thesis -
18
On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2010“…We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. …”
Get full text
Get full text
Get full text
Article -
19
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
20
Experimental evaluation of bottleneck link utilization with new-additive increase multiplicative decrease congestion avoidance and control algorithm.
Published 2009“…Approach: In this research we continued to study the performances of the New-Additive Increase Multiplicative Decrease (AIMD) algorithm as one of the core protocols for TCP congestion avoidance and control mechanism, we want now to evaluate the effect of using the AIMD algorithm after developing it to find a new approach, as we called it the New-AIMD algorithm to measure the bottleneck link utilization and use the NCTUns simulator to get the results after make the modification of the mechanism. …”
Get full text
Get full text
Article
