Search Results - (( things application based algorithm ) OR ( basic optimization mining algorithm ))

Refine Results
  1. 1

    Web usage mining for UUM learning care using association rules by Ramli, Azizul Azhar

    Published 2004
    “…With the powerful of data mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E�Learning portal. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Web Usage Mining for UUM Learning Care Using Association Rules by Azizul Azhar, Ramli

    Published 2004
    “…Main resources, server log files become a set of raw data where it's must go through with all the Web usage mining technique, Web usage mining approach has been combined with the basic Association Rules, Apriori Algorithm to optimize the content of the university E-Learning portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    An ensemble feature selection method to detect web spam by Oskouei, Mahdieh Danandeh, Razavi, Seyed Naser

    Published 2018
    “…Web spam detection is one of research fields of data mining. With regard to increasing available information in virtual space and the need of users to search, the role of search engines and used algorithms are important in terms of ranking. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8
  9. 9
  10. 10

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…Variants of the proposed kg-DFSA, traditional DFSA and another grouping based DFSA algorithm (FCM-DFSA) were implemented in MATLAB. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Reliable Fuzzy-Based Multi-Path Routing Protocol Based on Whale Optimization Algorithm to Improve QOS in 5G Networks for IOMT Applications by Al-Mukhtar F.S., Jaaz Z.A., Hamad A.H.

    Published 2024
    “…The "Quality of Services (QoS)" in 5G-based IoMT is improved by the Reliable Fuzzy-based Multi-path routing system shown in this study. …”
    Article
  17. 17

    Performance analysis of constrained device virtualization algorithm by Haseeb, Shariq, Hassan Abdalla Hashim, Aisha, Khalifa, Othman Omran, Ismail, Ahmad Faris

    Published 2020
    “…In more recent research, there have been theoretical proposals to virtualize constrained devices to abstract their data so that its always available to applications. We have adopted this technique in our research to virtualize the entire Internet of Things network so that virtual TCP/IP based protocols can operate on virtual networks for enabling interoperability. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications by Far Chen, Jong

    Published 2025
    “…Hardware prototypes using Raspberry Pi and Industrial Internet of Things components were interfaced with SCADA systems to validate real-world applicability. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20