Search Results - (( data distribution path algorithm ) OR ( _ evaluation mining algorithm ))
Search alternatives:
- data distribution »
- distribution path »
- evaluation mining »
- mining algorithm »
- path algorithm »
-
1
A Continuous Overlay Path Probing Algorithm For Overlay Networks
Published 2013“…Several experiments were carried out using the OMNeT++ simulation framework. The designed algorithm was evaluated using experimental data. The obtained results show that the continuous in-band overlay path probing algorithm (COPPA) provides up-to-date bandwidth information with reduced overhead and minimal impact on the traffic of the path.…”
Get full text
Get full text
Thesis -
2
Performance analysis of ZigBeePRO network using shortest path algorithm for Distributed Renewable Generation
Published 2021“…In this paper, we have analysed the performance of the ZigBeePRO network by applying the shortest path algorithm while delivering energy data from the solar DRG to the SG. …”
Get full text
Get full text
Article -
3
Performance Analysis of Swarm Intelligence-Based Routing Protocol for Mobile Ad Hoc Network and Wireless Mesh Networks
Published 2009“…Ants’ algorithm belongs to the Swarm Intelligence (SI), which is proposed to find the shortest path. …”
Get full text
Get full text
Thesis -
4
Traffic management algorithms for LEO satellite networks
Published 2016“…In dealing with traffic routing problem, two algorithms, Dijkstra's Shortest Path and Genetic Algorithm (GA) are combined together and enhanced to re-strategize a better routing mechanism for a heterogeneous mix of traffic classes ranging from traditional voice calls to multimedia data services in Low Earth Orbit (LEO) satellite networks. …”
Get full text
Get full text
Get full text
Thesis -
5
Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu
Published 2014“…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
Get full text
Get full text
Get full text
Article -
6
Resource-efficient coverage path planning for unmanned aerial vehicle based aerial gateway in LoRaWAN
Published 2022“…Due to finite resource, multiple issues need to be considered in designing such system, including AG flight time, coverage radius and the achievable data rate of the ground-to-air system, thus an Energy Efficient Coverage Path Planning (EECPP) algorithm has been proposed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Synchronization algorithm for remote heterogeneous database environment
Published 2015“…In this paper, we proposed a model and a unique algorithm to synchronize data between heterogeneous databases, in order to provide alternative synchronization paths, concurrency in operation and bidirectional mode of data exchange. …”
Get full text
Get full text
Article -
8
Resource-Efficient Coverage Path Planning for UAV-Based Aerial IoT Gateway
Published 2023“…The EECPP is composed of two algorithms: the Stop Point Prediction Algorithm using K-Means, and Path Planning Algorithm using Particle Swarm Optimization. …”
Get full text
Get full text
Get full text
Article -
9
Role Minimization As An Optimization Metric In Role Mining Algorithms : A Literature Review
Published 2018“…A recent access control model that could accommodate a dynamic structure such as cloud computing can be recognized as role based access control and the role management process of this access control can be identified as role mining.The current trend in role based access control is the role mining problem that can be described as the difficulty to uncover an optimum set of roles from the userpermission assignment.To solve this problem,the researchers have proposed role mining algorithms to produce role set and among the existing algorithms there is an intrinsic topic of the common perception to evaluate the goodness of the generated role set.Eventually,the value of the identified roles could be measured by the preferred metric of optimality namely the number of roles,sizes of userassignment and permission-assignment and Weighted Structural Complexity.Until now, there is some disagreement on the optimization metric but notably many researchers have agreed on the minimization of the number of roles as a solid metric.This paper discusses an overview of the current state-of-the-art on the recent role mining algorithms that focus on role minimization as an optimization metric to evaluate the goodness of the identified roles. …”
Get full text
Get full text
Get full text
Article -
10
Evaluation of data mining models for predicting concrete strength
Published 2024“…These models are all evaluated with hyperparameter tuning and different feature selection techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Energy efficiency of the bitcoin mining hardware and related blockchain technology
Published 2018“…The research proposes new formula and algorithm which allows the evaluation of energy efficiency for the hardware of bitcoins mining. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
12
An enhancement of path selection to cluster head based on multi-hop routing in two-tier wireless sensor network
Published 2019“…Currently, the data transmission from sensor nodes to the cluster head uses a single hop which consumes more energy; thus, in this paper the enhancement of previous algorithm, which is MAP, the data transmission will use several paths to reach the cluster head. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
An efficient algorithm to discover large and frequent itemset in high dimensional data
Published 2019“…For this reason, this research has proposed two new algorithms; RARE and RARE II, which mine colossal closed itemsets. …”
Get full text
Get full text
Monograph -
14
Tree-based contrast subspace mining method
Published 2020“…Then, the tree-based method, the genetic algorithm based parameter values identification of tree-based method, and followed by the genetic algorithm based tree-based method, for numerical data sets are developed and evaluated. …”
Get full text
Get full text
Get full text
Thesis -
15
Mining Of Resource Usage Using Evoc Algorithm In Grid Environment.
Published 2007Get full text
Get full text
Conference or Workshop Item -
16
Evaluation and optimization of frequent association rule based classification
Published 2014“…In this paper, a systematic way to evaluate the association rules discovered from frequent itemset mining algorithms, combining common data mining and statistical interestingness measures, and outline an appropriated sequence of usage is presented. …”
Get full text
Get full text
Get full text
Article -
17
-
18
-
19
Multi agent quality of service routing based on scheme ant colony optimization algorithm
Published 2014“…This study also introduces a new probe-based procedure for discovery and setup QoS path for real-time traffic. The proposed scheme has been simulated by OMNET++ and compared with standard AntNet and two well-known standard QoS routings; Widest Shortest Path (WSP) algorithm and Shortest Widest Path (SWP) algorithm. …”
Get full text
Get full text
Thesis -
20
A performance analysis of association rule mining algorithms
Published 2016“…In this paper, we evaluate the performance of association rule mining algorithms in-terms of execution times and memory usage using the CPU profiler of Java VisualVM. …”
Get full text
Get full text
Conference or Workshop Item
