Search Results - (( mobile evaluation drops algorithm ) OR ( _ identification mining algorithm ))
Search alternatives:
- identification mining »
- mobile evaluation »
- evaluation drops »
- _ identification »
- mining algorithm »
-
1
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…All the three proposed algorithms are evaluated using discrete event simulation, in particular Network Simulator tool (NS2), and compared with the latest routing algorithm (NCPR ) and fundamental algorithm (AODV) using five performance metrics. …”
Get full text
Get full text
Get full text
Thesis -
2
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
3
Performance evaluation of manet in presence of black hole nodes
Published 2017“…And then we will apply an algorithm that can offer better performance evaluation of the MANET compare to previous work[1]. …”
Get full text
Get full text
Thesis -
4
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm
Published 2015“…This algorithm is good for MANET as they not have centralized management and autonomous mobile nodes connect with each other through the air. …”
Get full text
Get full text
Thesis -
6
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023“…Classification (of information); Data mining; Digital forensics; Forestry; Learning algorithms; Loudspeakers; Motion compensation; Nearest neighbor search; Speech recognition; Trees (mathematics); K-near neighbor; Logistic model tree; Logistics model; Mel frequency cepstral co-efficient; Mel frequency cepstral coefficient; Mel-frequency cepstral coefficients; Mining classification; Model trees; Nearest-neighbour; Speaker identification systems; Authentication…”
Conference Paper -
7
A prototype for context identification of scientific papers via agent-based text mining
Published 2023Conference Paper -
8
A regulative norms mining algorithm for complex adaptive system
Published 2023“…Adaptive systems; Soft computing; Complex adaptive systems; Exceptional events; Mining algorithms; Normative system; Norms identifications; Regulative norms; Social norm; Data mining…”
Conference Paper -
9
Context identification of scientific papers via agent-based model for text mining (ABM-TM)
Published 2023“…In this paper, we propose an agent-based text mining algorithm to extract potential context of papers published in the WWW. …”
Article -
10
Discovering association rules for mining images datasets: a proposal
Published 2005“…The algorithm has four major steps: feature extraction, object identification, auxiliary image creation and object mining. …”
Get full text
Get full text
Conference or Workshop Item -
11
Privacy Preserving Features Selection for Data Mining using Machine Learning Algorithms
Published 2023Conference Paper -
12
A Text Mining Algorithm Optimising the Determination of Relevant Studies
Published 2023Conference Paper -
13
The application of neural network data mining algorithm into mixed pixel classification in geographic information system environment
Published 2007“…This , paper discusses the development of data mining and pattern recognition algorithm to handle the complexity of hyperspectral remote sensing images in Geographical Information Systems environment. …”
Get full text
Get full text
Conference or Workshop Item -
14
Outlier Detection Technique in Data Mining: A Research Perspective
Published 2005“…Finding ,removing and detecting outliers is very important in data mining, for example error in large databases can be extremely common, so an important property of a data mining algorithm is robustness with respect to outliers in the database. …”
Get full text
Get full text
Conference or Workshop Item -
15
Data mining for structural damage identification using hybrid artificial neural network based algorithm for beam and slab girder / Meisam Gordan
Published 2020“…In the modeling phase, amongst all DM algorithms, the applicability of machine learning, artificial intelligence and statistical data mining techniques were examined using Support Vector Machine (SVM), Artificial Neural Network (ANN) and Classification and Regression Tree (CART) to detect the hidden patterns in vibration data. …”
Get full text
Get full text
Get full text
Thesis -
16
Performance evaluation of enhanced MANETs routing protocols under video traffics, for different mobility and scalability models using OPNET
Published 2017“…Different mobility and scalability scenarios are evaluated after simulation of network with the help of OPNET modeler simulator…”
Get full text
Get full text
Get full text
Article -
17
Comparison of algorithm Support Vector Machine and C4.5 for identification of pests and diseases in chili plants
Published 2019“…Information about chili pests is collected so that it becomes a database that can be used to identify disease pests using the data mining method. The use of data mining algorithms is expected to help in the identification of pests and diseases in chili plants. …”
Get full text
Get full text
Conference or Workshop Item -
18
Data mining in mobile ECG based biometric identification
Published 2014Get full text
Get full text
Get full text
Article -
19
Potential norms detection in social agent societies
Published 2023“…In this paper, we propose a norms mining algorithm that detects a domain's potential norms, which we called the Potential Norms Mining Algorithm (PNMA). …”
Article -
20
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…Therefore, this paper aims to analyze and cluster the log file data to get useful information that helps understand the users' behavior. A variety of data mining techniques were used to address the problem; three steps of data pre-processing were applied, namely the cleaning of data, the identification of users, and the identification of sessions. …”
Get full text
Get full text
Article
