Search Results - (( java application mining algorithm ) OR ( variable integration protocol algorithm ))
Search alternatives:
- variable integration »
- integration protocol »
- application mining »
- protocol algorithm »
- java application »
- mining algorithm »
-
1
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
2
-
3
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
4
Mining Sequential Patterns Using I-PrefixSpan
Published 2007“…Sequential pattern mining is a relatively new data-mining problem with many areas of application. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…This stinginess of proximity measures in data mining tools is stifling the performance of the algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
Advanced Multiple Access Schemes for Multimedia Traffic over Wireless Channels
Published 2001“…Finally, an algorithm is proposed to integrate these algorithms to provide ubiquitous wireless ATM services. …”
Get full text
Get full text
Thesis -
7
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
8
Adaptive reservation TDMA protocol for wireless multimedia traffic
Published 2001“…Integration of CBR, voice, VBR, data and control traffic over the wireless ATM channel using the proposed AR-TDMA protocol is considered in the paper. …”
Get full text
Get full text
Get full text
Article -
9
Adaptive reservation TDMA protocol for wireless multimedia traffic
Published 2001“…Integration of CBR, voice, VBR, data and control traffic over the wireless ATM channel using the proposed AR-TDMA protocol is considered in the paper. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
-
12
Adaptive multi-polling scheduler for QoS support of video transmission in IEEE 802.11e WLANs
Published 2016“…In this paper, we present a dynamic TXOP assignment algorithm called adaptive multi-polling TXOP scheduling algorithm (AMTXOP) for supporting the video traffics transmission over IEEE 802.11e wireless networks. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks
Published 2021“…Besides, this framework offers high performance even with the challenging and high mobility scenarios related to the variability of mobility behaviour. The developed CEC-GP also includes an integrated approach that combined all clustering tasks such as cluster formation, cluster head selection, and cluster maintenance. …”
Get full text
Get full text
Get full text
Thesis
