Search Results - (( java application mining algorithm ) OR ( variable (selection OR section) protocol algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2
  3. 3

    Study and Implementation of Data Mining in Urban Gardening by Mohana, Muniandy, Lee, Eu Vern

    Published 2019
    “…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    New synchronization protocol for distributed system with TCP extension by Bayat, Peyman

    Published 2013
    “…In the worst condition, it optimized 3.99% higher than the most fault-tolerant previous works. The resulting algorithm does not involve variability in the hardware type nor is it based on specific distributed application software or databases. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Mining Sequential Patterns Using I-PrefixSpan by Dhany , Saputra, Rambli Dayang, R.A., Foong, Oi Mean

    Published 2007
    “…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7
  8. 8
  9. 9

    EZ-SEP: extended Z-SEP routing protocol with hierarchical clustering approach for wireless heterogeneous sensor network by Nurlan, Zhanserik, Zhukabayeva, Tamara, Othman, Mohamed

    Published 2021
    “…EZ-SEP was executed and compared to routing protocols such as Z-SEP, SEP, and LEACH. The proposed algorithm performed using the MATLAB R2016b simulator. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    A smart metering for energy management system via GSM-SMS based protocol by Fakharuddin, Azhar

    Published 2011
    “…The proposed monitoring system consist of a new energy calculation algorithm, offering electricity packages with a intelligent monitoring for daily power consumption connected to base-station via GSM network. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    An enhanced fingerprint template protection scheme by Siswanto, Apri

    Published 2022
    “…The results demonstrate that the enhanced chaos-based encryption algorithm for FTP improves its encryption time, which is 0.24 seconds faster than the selected benchmark study. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks by Talib, Mohammed Saad

    Published 2021
    “…The majority of the approaches follow heuristic-based protocol combined with various connected phases and processes, such as cluster formation, cluster head selection, and cluster maintenance. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Evaluation of retinal vascular calibers in overweight an obese Malay children by Siang, Chai Khai

    Published 2017
    “…Methods: This was a cross-sectional study involved 131 Malay children aged 6-12 years in Kota Bharu, Malaysia. …”
    Get full text
    Get full text
    Thesis