Search Results - (( using robust trust algorithm ) OR ( java application mining algorithm ))
Search alternatives:
- application mining »
- java application »
- mining algorithm »
- trust algorithm »
- using robust »
- robust trust »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
-
4
-
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
9
ETERS: A comprehensive energy aware trust-based efficient routing scheme for adversarial WSNs
Published 2021“…The proposed multi-trust approach is used to analyze the credibility of sensitive monitored data. …”
Get full text
Get full text
Article -
10
An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach
Published 2023“…The proposed machine learning algorithm extracts various trust features such as Co-Location Relationship (CLR), Co-Work Relationship (CWR), Cooperativeness-Frequency-Duration (CFD), and Reward (R) to obtain a robust trust rating of sensor devices and predict future misbehavior. …”
Get full text
Get full text
Article -
11
Individual And Ensemble Pattern Classification Models Using Enhanced Fuzzy Min-Max Neural Networks
Published 2014“…Firstly is by enhancing the learning algorithm of a neural-fuzzy network; and secondly by devising an ensemble model to combine the predictions from multiple neural-fuzzy networks using an agent-based framework. …”
Get full text
Get full text
Thesis -
12
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
13
Detecting sybil attacks in clustered wireless sensor networks based on energy trust system (ETS)
Published 2017“…It employs multi-level detection based on identity and position verification. Then, a trust algorithm is applied based on the energy of each sensor node. …”
Get full text
Get full text
Get full text
Article -
14
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…This project addresses these security concerns by developing a secure data collection and visualisation system using Raspberry Pi and Node-RED. The system integrates multiple robust encryption algorithms—AES-128, AES-256, ChaCha20, and Twofish—for end-to-end data protection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Secure scheme for user authentication and authorization in android environment
Published 2013“…Experimented on java platform, the implementation techniques discussed in the paper are found to be very robust…”
Get full text
Get full text
Get full text
Article -
16
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…The blockchain stores data with a high level of integrity and robustness, and it cannot be altered. When smart contracts are used to make decisions and conduct analytics with machine-learning algorithms, the results may be trusted and unquestioned. …”
Get full text
Get full text
Get full text
Article -
17
Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network
Published 2020“…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
Get full text
Get full text
Thesis -
18
Systematic review on ai-blockchain based e-healthcare records management systems
Published 2022“…The blockchain stores data with a high level of integrity and robustness, and it cannot be altered. When smart contracts are used to make decisions and conduct analytics with machine-learning algorithms, the results may be trusted and unquestioned. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Hybrid Models Of Fuzzy Artmap And Qlearning For Pattern Classification
Published 2015“…To overcome the opaqueness issue, a Genetic Algorithm (GA) is used to extract fuzzy if-then rules from QFAM. …”
Get full text
Get full text
Thesis -
20
Improvement of an integrated global positioning system and inertial navigation system for land navigation application
Published 2012“…Therefore, this work is concerned to presents an alternative method to integrate GPS and INS systems and provide a robust navigation solution with trusted position and velocity information. …”
Get full text
Get full text
Thesis
