Algorithms for frequent itemset mining: a literature review

CH Chee, J Jaafar, IA Aziz, MH Hasan… - Artificial Intelligence …, 2019 - Springer
Data Analytics plays an important role in the decision making process. Insights from such
pattern analysis offer vast benefits, including increased revenue, cost cutting, and improved …

A method to minimize the maintenance costs of a broadband access network based on optimal steady-state probability mixture distribution of proactive and reactive …

Ž Deljac, M Randić - Computers and Electrical Engineering, 2022 - Elsevier
Paper presents an analysis of the long-term maintenance of access lines in a real
broadband network. The dynamics of the maintenance process were recorded by using fault …

Optimal resource allocation for cellular networks with MATLAB instructions

A Abdelhadi, H Shajaiah - arXiv preprint arXiv:1612.07862, 2016 - arxiv.org
This report presents a more detailed description of the algorithm and simulations published
in papers [1, 2]. It includes a step by step description of the algorithm and included the …

Visual exploration of large hierarchies with information pyramids

K Andrews - Proceedings sixth international conference on …, 2002 - ieeexplore.ieee.org
Information pyramids compactly visualise large hierarchical structures in three dimensions
using pyramid-like structures, which grow upwards as the hierarchy deepens. A plateau …

[PDF][PDF] Ant colony optimization of interval Type-2 Fuzzy C-Means with subtractive clustering and multi-round sampling for large data

S Qaiyum, I Aziz, J Jaafar… - International Journal of …, 2019 - researchgate.net
Fuzzy C-Means (FCM) is widely accepted as a clustering technique. However, it cannot
often manage different uncertainties associated with data. Interval Type-2 Fuzzy C-Means …

Conceptual modeling of big data extract processes with UML

D Martinez-Mosquera, S Luján-Mora… - … and Computer Science …, 2017 - ieeexplore.ieee.org
Big Data is a popular term used to define the storage and processing of high volumes of
data. The main aim is to assist companies to make better business decisions. There is a lot …

Data cleaning technique for security logs based on Fellegi-Sunter theory

D Martinez-Mosquera, S Luján-Mora, G López… - … on systems analysis …, 2017 - Springer
Abstract Information security is one of the most important aspects an organization should
consider. Due to this matter and the variety of existing vulnerabilities, there are specialized …

Horus testbed: Implementation of real-time video streaming protocols

A Abdelhadi, A Gerstlauer… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
The integration of communication, computing, and control in mobile cyberphysical systems
leads to many challenges. This is due to the complex interactions between these three …

An approach to big data modeling for key-value NoSQL databases

The scientific community has a special interest in providing solutions to deal with a huge
amount of data generated by the Internet, mobile devices, and sensors, among others. One …

Spatial coexistence of cooperative radar and communication systems

A Abdelhadi - … on Performance Evaluation and Modeling in …, 2019 - ieeexplore.ieee.org
Future generations of cellular systems need to meet stringent requirements for bandwidth
and latency. This entitles maximum utilization of the available wireless spectrum. Given that …