Search Results - (( mobile evaluation cell algorithm ) OR ( identification _ mining algorithm ))
Search alternatives:
- mobile evaluation »
- mining algorithm »
- evaluation cell »
- cell algorithm »
-
1
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
2
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2015“…In this paper five scheduling algorithms were investigated and their performance was evaluated in terms of Fairness Index, Peak Throughput, Average Throughput and Edge Cell User Throughput. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
4
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023“…Classification (of information); Data mining; Digital forensics; Forestry; Learning algorithms; Loudspeakers; Motion compensation; Nearest neighbor search; Speech recognition; Trees (mathematics); K-near neighbor; Logistic model tree; Logistics model; Mel frequency cepstral co-efficient; Mel frequency cepstral coefficient; Mel-frequency cepstral coefficients; Mining classification; Model trees; Nearest-neighbour; Speaker identification systems; Authentication…”
Conference Paper -
5
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
6
A regulative norms mining algorithm for complex adaptive system
Published 2023“…Adaptive systems; Soft computing; Complex adaptive systems; Exceptional events; Mining algorithms; Normative system; Norms identifications; Regulative norms; Social norm; Data mining…”
Conference Paper -
7
Performance evaluation of LTE scheduling techniques for heterogeneous traffic and different mobility scenarios
Published 2014“…In this paper five scheduling algorithms were investigated and their performance was evaluated in terms of Fairness Index, Peak Throughput, Average Throughput and Edge Cell User Throughput. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
Article -
9
Discovering association rules for mining images datasets: a proposal
Published 2005“…The algorithm has four major steps: feature extraction, object identification, auxiliary image creation and object mining. …”
Get full text
Get full text
Conference or Workshop Item -
10
An integrated priority-based cell attenuation model for dynamic cell sizing
Published 2012“…A new, robust integrated priority-based cell attenuation model for dynamic cell sizing is proposed and simulated using real mobile traffic data.The proposed model is an integration of two main components; the modified virtual community – parallel genetic algorithm (VC-PGA) cell priority selection module and the evolving fuzzy neural network (EFuNN) mobile traffic prediction module.The VC-PGA module controls the number of cell attenuations by ordering the priority for the attenuation of all cells based on the level of mobile level of mobile traffic within each cell.The EFuNN module predicts the traffic volume of a particular cell by extracting and inserting meaningful rules through incremental, supervised real-time learning.The EFuNN module is placed in each cell and the output, the predicted mobile traffic volume of the particular cell, is sent to local and virtual community servers in the VC-PGA module.The VC-PGA module then assigns priorities for the size attenuation of all cells within the network, based on the predicted mobile traffic levels from the EFuNN module at each cell.The performance of the proposed module was evaluated on five adjacent cells in Selangor, Malaysia. …”
Get full text
Get full text
Get full text
Article -
11
Privacy Preserving Features Selection for Data Mining using Machine Learning Algorithms
Published 2023Conference Paper -
12
Deep Learning-Driven Mobility And Utility-Based Resource Management In Mm-Wave Enable Ultradense Heterogeneous Networks
Published 2025thesis::doctoral thesis -
13
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
14
Inter system handoff management in cellular mobile networks / Syamil Khalid
“…This paper presents a handoff technique which supports mobility between dissimilar networks. The boundary cell of cellular network system is designed by using MATLAB design software. …”
Get full text
Get full text
Article -
15
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
16
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Finding ,removing and detecting outliers is very important in data mining, for example error in large databases can be extremely common, so an important property of a data mining algorithm is robustness with respect to outliers in the database. …”
Get full text
Get full text
Conference or Workshop Item -
17
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
18
Inter-system handoff management in mobile cellular networks / Syamil Khalid
Published 2011“…The theoretical analysis and simulation result are studied to evaluate the handoff parameters and signal strength of mobility.…”
Get full text
Get full text
Thesis -
19
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
20
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article
