Search Results - (( java application server algorithm ) OR ( a simulation mining algorithm ))
Search alternatives:
- application server »
- simulation mining »
- java application »
- server algorithm »
- mining algorithm »
- a simulation »
-
1
Network game (Literati) / Chung Mei Kuen
Published 2003“…Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
Get full text
Get full text
Thesis -
2
-
3
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
4
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
5
Modeling and simulation of the industrial numerical distance relay aimed at knowledge discovery in resident event reporting
Published 2014“…With the successful modeling and simulation of the AREVA MiCOM P441 distance relay and its recording facility, such subsequent works as data extraction and preparation, computational intelligence-based data mining for relay decision algorithm discovery and finally a relay analysis expert system development can certainly be executed. …”
Get full text
Get full text
Article -
6
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
7
-
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…On the basis of the results of this research, it can be concluded that the developed prototype had high accuracy and security when transferring the file between the sender and receiver that was implemented in client-server application. This research hopes to give a clear idea to the readers about ABS algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was mainly developing using java programming. Apache Tom cat was used as a server in order to run the application smoothly. …”
Get full text
Get full text
Thesis -
10
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Attached sensors generate data and send these data to the Java Servlet application through a WIFI module. These data are processed and stored in appropriate formats in a MySQL server database. …”
Get full text
Get full text
Get full text
Article -
11
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
12
A partition based feature selection approach for mixed data clustering / Ashish Dutt
Published 2020“…Traditional data mining algorithms cannot be directly applied to educational problems, as they may have a specific objective and function. …”
Get full text
Get full text
Get full text
Thesis -
13
Framework for mining XML format business process log data
Published 2024“…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The plugin can be 'installed' on any other web application with minimum efforts. The algorithm can be implemented as part of Web Server layer, not as part of the business logic layer. …”
Get full text
Get full text
Conference or Workshop Item -
15
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
16
Data Mining On Machine Breakdowns And Effectiveness Of Scheduled Maintenance
Published 2019“…Second, a proposed simulation model for the operational process was designed based on a real medical tool manufacturing plant. …”
Get full text
Get full text
Monograph -
17
Peer to Peer Video Streaming Application
Published 2008Get full text
Get full text
Final Year Project -
18
Multi-Objective Hybrid Algorithm For The Classification Of Imbalanced Datasets
Published 2019“…A new self-adaptive hybrid algorithm (CSCMAES) is introduced for optimization. …”
Get full text
Get full text
Thesis -
19
-
20
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The KDD approach was applied on a simulated event report recording ‘extracted’ from a numerical distance relay that had been modeled to emulate an actual distance protective relay device used by TNB, a Malaysian utility company. …”
Get full text
Get full text
Thesis
