Search Results - (( java application mining algorithm ) OR ( control optimization window algorithm ))
Search alternatives:
- control optimization »
- application mining »
- java application »
- mining algorithm »
- window algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
An optimized aggregate marker algorithm for bandwidth fairness improvement in classifying traffic networks
Published 2016“…Additionally, the assured service is designed for applications relying on the Transmission Control Protocol (TCP). This article analyses and evaluates a new time sliding window traffic marker algorithm called the Optimized time sliding window Three Colour Marker (OtswTCM). …”
Get full text
Get full text
Get full text
Article -
4
QTCP: an optimized and improved congestion control algorithm of high-speed TCP networks
Published 2011“…To overcome these problems Quick Transport Control Protocol (QTCP) algorithm based on optimizations of HS-TCP slow start algorithm and Additive Increase and Multiplicative Decrease (AIMD) algorithm have been proposed. …”
Get full text
Get full text
Conference or Workshop Item -
5
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
6
Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks
Published 2022“…The second part proposes an optimized flexible window-overlapping scheduling (OFWOS) algorithm that optimizes the offset difference ( ) between the samepriority TT windows in the adjacent nodes. …”
Get full text
Get full text
Thesis -
7
Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm
Published 2016“…This signifies that the training was successful based on the fitted values of the window size. Thus the proposed model trained with the CS algorithm provides a high convergence rate to the true global minimum and a better optimal solution. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
12
-
13
Distributed joint power control, beamforming and spectrum leasing for cognitive two-way relay networks
Published 2017“…A search method with numerous advantages over conventional algorithms, has been designed to solve the optimization problems with an enhanced global optimality and convergence speed. …”
Get full text
Get full text
Thesis -
14
Analysis and Decentralised Optimal Flow Control of Heterogeneous Computer Communication Network Models
Published 1993“…The problem of analysing multiclass general closed queueing network models with single server and multiserver is presented followed by the problem of decentralised optimal local flow control of multiclass general computer communication networks with single and multiple transmission links. …”
Get full text
Get full text
Thesis -
15
Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol
Published 2024“…First is the Versatile Shuffle Recomputation Resource Units (VSR-RUs), which use the Fisher-Yates shuffling algorithm to optimize RU utilization and reduce collisions. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
18
-
19
-
20
Analysis and decentralised optimal flow control of heterogeneous computer communication network models
Published 1993“…The problem of analysing multiclass general closed queueing network models with single server and multiserver is presented followed by the problem of the centralised optimal local flow control of multiclass general computer communication networks with single and multiple transmission links. …”
Get full text
Get full text
Get full text
Thesis
