Search Results - (( based optimization max algorithm ) OR ( pattern detection mining algorithm ))
Search alternatives:
- pattern detection »
- optimization max »
- detection mining »
- mining algorithm »
- max algorithm »
-
1
-
2
A particle swarm optimization and min-max-based workflow scheduling algorithm with QoS satisfaction for service-oriented grids
Published 2017“…The algorithm selects the best scheduling solutions based on the proposed constraint-handling strategy. …”
Get full text
Get full text
Article -
3
Effective mining on large databases for intrusion detection
Published 2014“…Data mining is a common automated way of generating normal patterns for intrusion detection systems. …”
Get full text
Get full text
Conference or Workshop Item -
4
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Finding ,removing and detecting outliers is very important in data mining, for example error in large databases can be extremely common, so an important property of a data mining algorithm is robustness with respect to outliers in the database. …”
Get full text
Get full text
Conference or Workshop Item -
5
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
6
Detecting Critical Least Association Rules In Medical Databases
Published 2010“…We also employed our scalable algorithm called Significant Least Pattern Growth algorithm (SLP-Growth) to mine the respective association rules. …”
Get full text
Get full text
Article -
7
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Data mining is a well-known artificial intelligence technique to build network intrusion detection systems. …”
Get full text
Get full text
Get full text
Article -
8
-
9
Fair bandwidth assignment in hierarchical scheduling for mobile WiMAX system
Published 2011“…In this paper, we propose a fair bandwidth assignment algorithm that allocates the bandwidth among different services classes based on a hierarchical scheduler. …”
Get full text
Get full text
Conference or Workshop Item -
10
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Even the smart people are unable to report an email as a spam when the spammer tries to defraud them. The aim of data mining is to search and find undetermined patterns in huge databases. …”
Get full text
Get full text
Thesis -
11
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
12
Prediction and multi-criteria-based schemes for seamless handover mechanism in mobile WiMAX networks
Published 2013“…It reduces the number of handovers by 29.7% and 26.9%, respectively, compared to the conventional RSSI based handover algorithm and the previous worked, mobility improved handover (MIHO) algorithm. …”
Get full text
Get full text
Thesis -
13
Fair uplink bandwidth allocation and latency guarantee for mobile WiMAX using fuzzy adaptive deficit round robin
Published 2014“…One example of such a network is called WiMAX which is driven by WiMAX Forum based on IEEE 802.16 Wireless MAN standard. …”
Get full text
Get full text
Get full text
Article -
14
Cross-layer design using multi-channel system in WiMAX mesh networks
Published 2008“…The WiMAX mesh networks based on IEEE 802.16 standard is a key topology for the next generation wireless networking. …”
Get full text
Get full text
Conference or Workshop Item -
15
A comparative evaluation of heuristic and metaheuristic job scheduling algorithms for optimized resource management in cloud environments
Published 2026“…This study provides a comprehensive analysis and comparison of six prevalent scheduling algorithms, namely FCFS, SJF, LJF, EDF, Max-Min, and PSO, under varying cloudlet loads of 200,400,600,800, and 1000. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
Published 2016“…Hence, these approaches regularly fail to provide optimal results on specific graph instances. These problems motivated to propose Max Degres Around (MDA) approximation algorithm for the MVC problem. …”
Get full text
Get full text
Get full text
Article -
17
A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications
Published 2022“…Without human input, these algorithms discover patterns or groupings in the data. …”
Get full text
Get full text
Article -
18
Tracking student performance in introductory programming by means of machine learning
Published 2023Conference Paper -
19
An Improved Artificial Dendrite Cell Algorithm for Abnormal Signal Detection
Published 2018“…This causes the DCA fails to detect new data points if the pattern has distinct behavior from previous information and affects detection accuracy. …”
Get full text
Get full text
Article -
20
Improvement of Centralized Routing and Scheduling Using Cross-Layer Design and Multi-Slot Assignment in Wimax Mesh Networks
Published 2009“…WiMAX (Worldwide Interoperability for Microwave Access) based wireless mesh network (WMN) aims to provide broadband wireless last-mile access. …”
Get full text
Get full text
Thesis
