Search Results - (( java application mining algorithm ) OR ( parameter destination a algorithm ))
Search alternatives:
- parameter destination »
- application mining »
- java application »
- mining algorithm »
- destination a »
- a algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Modelling of multi-robot system for search and rescue
Published 2023“…The PSO algorithm functions as a global path planner, determining the complete path for each robot, whereas a sensor-based obstacle avoidance algorithm serves as a local planner to avoid collision with dynamic obstacles during navigation. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Artificial Bee Colony for Minimizing the Energy Consumption in Mobile Ad Hoc Network
Published 2019“…The aim of this paper is to find the best possible route from the source to the destination based on a method inspired by the searching behaviour of bee colonies, i.e. artificial bee colony (ABC) algorithm. …”
Get full text
Get full text
Article -
10
Review of Network on Chip Architectures
Published 2017“…The packet traverses along these nodes to reach the destination using routing algorithm. Conclusion: In this paper, NoC architectures are reviewed using different parameters, detail information is also provided for these parameters. …”
Get full text
Get full text
Article -
11
A genetic approach for gateway placement in wireless mesh networks
Published 2015“…Thus, finding near optimal solution is essential to improve the net operation. This paper proposes a novel approach to solve this problem using Genetic Algorithm (GA) to achieve a near optimal solution, considering the number of IGs and the number of hops that the packet traverses between the IG and the source/ destination MR (MR-IG). …”
Get full text
Get full text
Get full text
Article -
12
Comparison of DSR, AODV and DSDV routing protocols in mobile ad-hoc networks: A survey
Published 2014“…A mobile ad hoc network (MANET) is a collection of mobile nodes that is connected through a wireless medium forming rapidly changing topologies.Mantes are infrastructure less and can be set up anytime, anywhere.We have conducted survey of protocol properties of various MANET routing algorithms and analyzed them.The routing algorithms considered are classified into three categories proactive (table driven) , reactive (on demand) and Hybrid protocol.The algorithms considered are Dynamic Source Routing (DSR), Ad-hoc On-Demand Distance Vector Routing (AODV) and Destination sequence Vector (DSDV) have been proposed to solve the multi hop routing problem in Ad-hoc networks.The comparison among three routing protocols are based on the various protocol property parameters such as Routing overhead, packet delivery ratio, end-to-end delay, path optimality, and throughput are some metrics commonly used in the comparisons.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…In both global and local PP systems, a mobile robot should be able to navigate effectively until it reaches a destination without colliding with any obstacles within an environment. …”
Get full text
Get full text
Thesis -
14
Collision avoidance mechanisms using artificial potential field for UAVs
Published 2025“…The developed simulation framework serves as a reproducible platform for benchmarking and future algorithmic extensions. …”
Get full text
Get full text
Get full text
Article -
15
Analysis On QOS Parameters To Predict Http Response
Published 2017“…Therefore, the real live world web service label data uses to evaluate the focus parameters using classification machine learning algorithms to process the data. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…Multi-Instance Broker Scheduling Algorithm (MiBSA) has been proposed as a new scheduling algorithm to get rid of the drawback from the iHLBA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Relay suitability based routing protocol for video streaming in vehicular ad-hoc network
Published 2022“…The RESP estimates the geographic advancement and link stability of a vehicle towards its destination in the small region. …”
Get full text
Get full text
Thesis -
18
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…Then, timetabling process is performed to identify a set of departure times at both origin and destination based on predefined parameters. …”
Get full text
Get full text
Thesis -
19
Obfuscatable aggregatable signcryption scheme with PadSteg for unattended devices in IoT systems
Published 2019“…The scheme will be useful in a various scenario of IoT environment where data is sent from unattended nodes to the destination known as a sink or receiver.…”
Get full text
Get full text
Thesis -
20
Performance evaluation of manet in presence of black hole nodes
Published 2017“…Mobile ad-hoc network (MANET) is a standout amongst the most dynamic exploration subjects amid the earlier years. …”
Get full text
Get full text
Thesis
