Search Results - (( using optimization method algorithm ) OR ( data generating query algorithm ))
Search alternatives:
- method algorithm »
- generating query »
- data generating »
-
1
Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model
Published 2024“…The large amount of data generated and frequent changes in a short time make conventional processing methods insufficient. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Customer mobile behavioral segmentation and analysis in telecom using machine learning
Published 2021“…Firstly, the customer’s dataset was generated using Faker Python package. Secondly was the pre-processing which includes the dimensionality reduction of the dataset using the PCA technique and finding the optimal number of clusters using the Elbow method. …”
Get full text
Get full text
Article -
4
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…This study proposes a new algorithm, namely XMCCTreeGenerator, to enhance the efficiency of the CGTree- MCCTreeGenerator. …”
Get full text
Get full text
Thesis -
5
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Finally, the system utilizes a query formulation algorithm (QRYF) to select the structured queries that best interpret user query. …”
Get full text
Get full text
Get full text
Thesis -
6
The skyline operator algorithms: a review
Published 2019“…In the present decade, there is the revival of interest to find the best way to query the database that able to provide not only a single answer, but also a set of answers that can be the most preferred by users .In many cases, the overflow of data generated from social media, and many other data stored and shared over the Internet makes the data access becoming near –infinite to the users. …”
Get full text
Get full text
Get full text
Article -
7
Join query enhancement processing (jqpro) with big rdf data on a distributed system using hashing-merge join technique
Published 2021“…Furthermore, the hash-join and Sort-Merge algorithms were used to generate the join query processing, and this was employed due to their capacity to allow for more data sets to be joined. …”
Get full text
Get full text
Thesis -
8
Effective keyword query structuring using NER for XML retrieval
Published 2015“…It also include a ranking function computes a score for each generated query by using both semantic information and data statistic as opposed to data statistic only approach used by the existing approaches.…”
Get full text
Get full text
Article -
9
Skyline queries on data with uncertain dimensions for efficient computation
Published 2018“…Skyline query is crucial in multi-criteria decision making applications particularly in applications that generate uncertain data. …”
Get full text
Get full text
Thesis -
10
Direct approach for mining association rules from structured XML data
Published 2012“…The experiments were conducted on self generated data sets (7 different sets) and well known datasets (Mushroom & Cars Data set). …”
Get full text
Get full text
Thesis -
11
HAPTIC VISUALIZATION USING VISUAL TEXTURE INFORMATION
Published 2011“…In the query process, accuracy is determined by the number of feature vector elements, data extraction, and similarity measurement algorithm. …”
Get full text
Get full text
Thesis -
12
Dominance analyses reduction in skyline query processing over data stream with data mining technique
Published 2025“…DAR employs the Apriori algorithm, one of the most prevalent data mining algorithms, to identify the frequently occurring dominance analyses. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Enhanced privacy protection from location dependent attacks in location based services using spatial cloaking
Published 2020“…In addition, dummy queries are generated to protect users from unusual situations. …”
Get full text
Get full text
Get full text
Article -
14
Enhanced Privacy Protection Against Location-Dependent Attacks in Location Based Services Using Spatial Cloaking
Published 2020“…In addition, dummy queries are generated to protect users from unusual situations. …”
Get full text
Get full text
Article -
15
A flexible query transformation framework for structured retrieval / Gan Keng Hoon
Published 2013“…Its main strength is to allow the transformation to be generic to cater for more than single type of structure query. Supporting this intermediate query representation are the query interpretation and query construction algorithms. …”
Get full text
Get full text
Thesis -
16
Keyword query processing interface model of ontological natural language manipulation
Published 2010“…The generated target queries are required to be ranked so that the results are reported in order to their relevance to the user query. …”
Get full text
Get full text
Thesis -
17
Evaluation of XML documents queries based on native XML database
Published 2016“…Most of the figures show that the XED starts better, but becomes worse as data size grows. The difference becomes obvious as the query becomes more complicated.…”
Get full text
Get full text
Thesis -
18
E-Hadith DV: Hadith scriptures in Syafie Madhhab retrieval using data visualization / Nor Faezahtul Salme Norhisam
Published 2020“…Next, the TF-IDF algorithm is performed on the processed data to find the relevant hadith based on the user’s query. …”
Get full text
Get full text
Thesis -
19
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. …”
Get full text
Get full text
Conference or Workshop Item -
20
NoInjection: Preventing Unsafe Queries on NoSQL-Document-model Databases
Published 2022“…This method utilizes the Asymmetric encryption algorithm, RSA in particular. Using this method, key pairs are generated and exchanged during the design. …”
Get full text
Get full text
Conference or Workshop Item
