Search Results - (( mobile evaluation between algorithm ) OR ( inspired classification mining algorithm ))
Search alternatives:
- inspired classification »
- classification mining »
- evaluation between »
- mobile evaluation »
- between algorithm »
- mining algorithm »
-
1
Ideal combination feature selection model for classification problem based on bio-inspired approach
Published 2020“…Such a finding indicates that the exploitation of bio-inspired algorithms with ideal combination of wrapper/filtered method can contribute in finding the optimal features to be used in data mining model construction.…”
Get full text
Get full text
Book Section -
2
Optimization of attribute selection model using bio-inspired algorithms
Published 2019“…Such a finding indicates that bio-inspired algorithms can contribute in identifying the few most important features to be used in data mining model construction.…”
Get full text
Get full text
Get full text
Article -
3
Rule pruning techniques in the ant-miner classification algorithm and its variants: A review
Published 2018“…Rule-based classification is considered an important task of data classification.The ant-mining rule-based classification algorithm, inspired from the ant colony optimization algorithm, shows a comparable performance and outperforms in some application domains to the existing methods in the literature.One problem that often arises in any rule-based classification is the overfitting problem. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
4
Utilisation of Exponential-Based Resource Allocation and Competition in Artificial Immune Recognition System
Published 2011“…Artificial Immune Recognition System is one of the several immune inspired algorithms that can be used to perform classification, a data mining task. …”
Get full text
Get full text
Thesis -
5
An Efficient IDS Using Hybrid Magnetic Swarm Optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Article -
6
An efficient IDS using hybrid Magnetic swarm optimization in WANETs
Published 2018“…In order to improve the effectiveness of intrusion detection systems (IDSs), data analysis methods such as data mining and classification methods are often integrated with IDSs. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Performance evaluation of vertical handoff in fourth generation (4G) networks model
Published 2009Get full text
Working Paper -
8
Performance comparison between genetic algorithm and ant colony optimization algorithm for mobile robot path planning in global static environment / Nohaidda Sariff
Published 2011“…The main goal of this research is to compare the performances between Genetic Algorithm (GA) and Ant Colony Optimization (ACO) algorithm. …”
Get full text
Get full text
Thesis -
9
INVESTIGATION OF IMPROVED CHROMAMETRY MEASUREMENT ALGORITHM FOR PALM OIL FRESHNESS & SAFETY IDENTIFICATION USING MOBILE PHONE
Published 2017“…The relationship between colour space and the chromametry algorithm measurement is the main criteria when determining the freshness of the food.…”
Get full text
Get full text
Final Year Project -
10
A new Doppler Spread Estimation Algorithm Based on Zero Crossings of The Auto-correlation
Published 2010“…The Doppler spread, or evenly, the mobile speed of motion, is an evaluation of the spectral spreading of mobile fading channel. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh
Published 2021“…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Inter-system handoff management in mobile cellular networks / Syamil Khalid
Published 2011“…A simulation model developed to study the performance of the relative signal strength with hysteresis and threshold (RSS-HT) algorithm between mobile and radio tower in cellular network. …”
Get full text
Get full text
Thesis -
13
Permission-based fault tolerant mutual exclusion algorithm for mobile Ad Hoc networks
Published 2015“…This method is then utilized as the basis of dynamic ancestral mutual exclusion algorithm for MANET which is named as MDA. This algorithm is presented and evaluated for different scenarios of mobility of nodes, failure, load and number of nodes. …”
Get full text
Get full text
Thesis -
14
Inter system handoff management in cellular mobile networks / Syamil Khalid
“…This paper presents a handoff technique which supports mobility between dissimilar networks. The boundary cell of cellular network system is designed by using MATLAB design software. …”
Get full text
Get full text
Article -
15
Security enhancement of route optimization in mobile IPv6 networks
Published 2008“…An enhanced security algorithm is developed on top of MIPv6 RO to secure data and prepare a safe communication between MN and CN. …”
Get full text
Get full text
Get full text
Article -
16
Mobile data gathering algorithms for wireless sensor networks
Published 2014“…This algorithm enables shortened tour length for the respective mobile element. …”
Get full text
Get full text
Thesis -
17
Performance evaluation of mobile ad hoc network in wireless LAN / Norfadhilah Hasan
Published 2005“…The work presented in this paper evaluates the performance of two MANET routing protocol known as Dynamic Source Routing (DSR) and Temporally Ordered Routing Algorithm (TORA). …”
Get full text
Get full text
Thesis -
18
Secure mobile AES encryptor (SMAE)
Published 2016“…The purpose of this project is to identify a way to develop a mobile web application for the encryption and decryption of files using the 256 –bit Advanced Encryption Standard (AES) encryption algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Enhanced Ad Hoc On-Demand Distance Vector Routing Protocol For Mobile Ad Hoc Network Internet Connectivity
Published 2006“…There are several ad hoc routing protocols, such as AODV, DSR, and DSDV that propose solutions for routing within a mobile ad hoc network. However, since there is an interest in communication between not only mobile devices in an ad hoc network, but also between a mobile device in an ad hoc network and a fixed device in a fixed network (e.g. the Internet), the ad hoc routing protocols need to be modified. …”
Get full text
Get full text
Thesis -
20
