default search action
International Journal of Business Intelligence and Data Mining, Volume 14
Volume 14, Numbers 1/2, 2019
- K. G. Manjunath, Natarajan Jaisankar:
Effective optimisation of Honda algorithm for rear end collision avoidance system with genetic algorithm. 3-12 - K. G. Manjunath, Natarajan Jaisankar:
Comparison between optimised genetic-based Honda algorithm and Honda algorithm for collision avoidance system. 13-24 - Thulasi Bikku, N. Sambasiva Rao, Ananda Rao Akepogu:
A novel multi-class ensemble model based on feature selection using Hadoop framework for classifying imbalanced biomedical data. 25-39 - R. Ranjana, S. Radha, J. Raja:
Network affinity aware energy efficient virtual machine placement algorithm. 40-53 - Easwaramoorthy Arul, Venugopal Manikandan:
Dynamic runtime protection technique against the file system injecting malwares. 54-61 - R. Bhavani, V. Prakash, K. Chitra:
An efficient clustering approach for fair semantic web content retrieval via tri-level ontology construction model with hybrid dragonfly algorithm. 62-88 - N. Geetha, P. T. Vanathi:
Knowledge transfer for efficient cross domain ranking using AdaRank algorithm. 89-105 - K. Nithiyananthan, Pratap Nair, Raman Raguraman, Tan Yong Sing, Syahrel Emran Bin Siraj:
Enhanced R package-based cluster analysis fault identification models for three phase power system network. 106-120 - K. S. Bhuvaneshwari, D. Bhanu, S. Sophia, S. Kannimuthu:
Probabilistic variable precision fuzzy rough set technique for discovering optimal learning patterns in e-learning. 121-137 - J. Hemalatha, M. K. Kavitha Devi, S. Geetha:
Enhancing the JPEG image steganography security by RSA and attaining high payload using advanced DCT replacement method and modified quantisation table. 138-154 - Shekhar Shukla, Bhaba Krishna Mohanty, Ashwani Kumar:
A fuzzy approach to prioritise DEA ranked association rules. 155-176 - K. Narasimha Mallikarjunan, S. Mercy Shalinie, A. Bhuvaneshwaran:
BAIT: behaviour aided intruder testimony technique for attacker intention prediction in business data handling. 177-198 - A. Prabhu, M. Usha:
A secured best data centre selection in cloud computing using encryption technique. 199-217 - N. Chidambararaj, K. Chitra:
Minimal constraint based cuckoo search algorithm for removing transmission congestion and rescheduling the generator units. 218-237 - Anton A. Gerunov:
Modelling economic choice under radical uncertainty: machine learning approaches. 238-253 - Elena N. Stankova, Andrey V. Balakshiy, Dmitry A. Petrov, Vladimir V. Korkhov, Andrey V. Shorov:
OLAP technology and machine learning as the tools for validation of the numerical models of convective clouds. 254-266 - Rahma Djiroun, Kamel Boukhalfa, Zaia Alimazighi:
Data cubes retrieval and design in OLAP systems: from query analysis to visualisation tool. 267-298
Volume 14, Number 3, 2019
- Preeti A. Bailke, S. T. Patil:
Distributed algorithms for improved associative multilabel document classification considering reoccurrence of features and handling minority classes. 299-321 - Vijayalakshmi Balasubramanian, Sugumar Rajendran:
Rough set theory-based feature selection and FGA-NN classifier for medical data classification. 322-358 - J. Anitha, P. V. G. D. Prasad Reddy, M. S. Prasad Babu:
Error tolerant global search incorporated with deep learning algorithm to automatic Hindi text summarisation. 359-380 - S. Ephina Thendral, Valliyammai Chinnaiah:
A distributed cross layer recommender system incorporating product diffusion. 381-400 - M. T. Ketthari, Sugumar Rajendran:
Privacy preserving data mining using hiding maximum utility item first algorithm by means of grey wolf optimisation algorithm. 401-418
Volume 14, Number 4, 2019
- Amril Nazir:
A critique of imbalanced data learning approaches for big data analytics. 419-457 - A. Santhana Vijayan, S. R. Balasundaram:
Fuzzy-MCS algorithm-based ontology generation for e-assessment. 458-472 - J. P. Nivash, L. D. Dhinesh Babu:
Effective discovery of missing links in citation networks using citation relevancy check process. 473-488 - T. Srikanth, M. Shashi:
An effective preprocessing algorithm for model building in collaborative filtering-based recommender system. 489-503 - M. Manickam, N. Ramaraj, C. Chellappan:
A combined PFCM and recurrent neural network-based intrusion detection system for cloud environment. 504-527 - Rachana Mehta, Keyur Rana:
Evolution of singular value decomposition in recommendation systems: a review. 528-547
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.