Search Results - (( using self protocol algorithm ) OR ( java application mining algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    A Grid-Based Reliable Routing (GBRR) protocol for wireless sensor networks by Jiang, Cailing

    Published 2019
    “…In this research, collaborated with clustering and grid-based routing features, the proposed protocol uses a combination of clustering protocols and geographical protocols with greedy algorithm to accomplish the scalability and adaptability of the randomly deployed sensor networks in a dense and large-scale network. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A design of redirect link failure protocol based on dynamic source routing for mobile ad hoc networks by Ghazali, Osman, Hassan, Suhaidi, M. Kadhum, Mohammed

    Published 2011
    “…The characteristics of ad hoc networks are that they are decentralized, self-organized, self-deployed, and they possess dynamic network topology.All mobile nodes in ad hoc network communicate with each other directly or through intermediate nodes by using routing protocols algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Monograph
  9. 9

    Energy balancing mechanisms for decentralized routing protocols in wireless sensor networks by Saleh, Ahmed Mohammed Shamsan

    Published 2012
    “…The goal of these operations is to update and offer new routing information in order to construct the multiple paths resulting in an increased reliability of the system. Finally, we propose Self-Decision Route Selection scheme which is an improvement of the Hop-based Spanning Tree (HST) algorithm that is used in some routing protocols such as AODV and DSR. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Detection of black hole nodes in mobile ad hoc network using hybrid trustworthiness and energy consumption techniques by Mustafa, Ahmed Sudad

    Published 2017
    “…Ad hoc on-demand distance vector routing protocol (AODV) is a commonly used protocol in MANET. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    SNR-Based OLSR Routing Protocol for Wireless Mesh Networks by Elobaid, Mohamed Elshaikh

    Published 2009
    “…The unpredictable behavior of the wireless medium in WMNs environment demands the need for a routing protocol that is aware of the link conditions. Unfortunately the routing protocols used such as AODV and Dynamic source routing (DSR) are hop count-based; where the routing algorithm uses the number of nodes to determine the optimum path to the destination. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Performance evaluation of enhanced MANETs routing protocols under video traffics, for different mobility and scalability models using OPNET by Ahmed, Diaa Eldein Mustafa, Khalifa, Othman Omran

    Published 2017
    “…Mobile Ad hoc Networks (MANETs) is a type of wireless networks which consist of a collection of wireless mobile nodes forming a self-configured and self-organized network without any need for using existing infrastructure or centralized administration. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol by Zazali, Azyyati Adiah

    Published 2024
    “…Extensive Discrete Event Simulation (DES) has been used as a quantitative research tool to evaluate these algorithms using the following metrics: average throughput, collision probability, channel efficiency, and average channel access delay. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  16. 16

    A comparative study for parameter selection in online auctions by Gan, Kim Soon

    Published 2009
    “…The task even gets more complicated when there are different start and end times and when the auctions employ different protocols. Due to the complex and dynamic nature of the online auction, one of the strategies employed is using genetic algorithm to discover the best strategy. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Efficient data delivery in dense reader environment of passive sensor network by Nawaz, F., Jeoti, V.

    Published 2020
    “…GREEN protocol even works in DRE producing high packet transmission percentage because the protocol arrangement is used with the network coding and retransmission request capabilities. …”
    Get full text
    Get full text
    Article
  18. 18

    Performance evaluation of manet in presence of black hole nodes by Dhahir, Saif Mahmood

    Published 2017
    “…The evaluation of two different scenarios using AODV routing protocol such as varying the number of black hole nodes and different mobility speed of the nodes. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Multipath routing protocol based on cross-layer approach for MANET by Allahham, Alaa Azmi, Mohammed, Muamer N., Kadhim, Nassir Sallom

    Published 2017
    “…Mobile Ad-hoc Networks (MANETs) involved in many applications, whether smart or traditional and for both civilian and military uses, and that because of their special features, where it does not depend on any infrastructure during its working, as well as the nodes in MANETs have a freedom of movement with the ability to self-configure, in addition, to working as a router or client at the same time. …”
    Get full text
    Get full text
    Get full text
    Article