Algorithms for frequent itemset mining: a literature review
Data Analytics plays an important role in the decision making process. Insights from such
pattern analysis offer vast benefits, including increased revenue, cost cutting, and improved …
pattern analysis offer vast benefits, including increased revenue, cost cutting, and improved …
A method to minimize the maintenance costs of a broadband access network based on optimal steady-state probability mixture distribution of proactive and reactive …
Ž Deljac, M Randić - Computers and Electrical Engineering, 2022 - Elsevier
Paper presents an analysis of the long-term maintenance of access lines in a real
broadband network. The dynamics of the maintenance process were recorded by using fault …
broadband network. The dynamics of the maintenance process were recorded by using fault …
Optimal resource allocation for cellular networks with MATLAB instructions
A Abdelhadi, H Shajaiah - arXiv preprint arXiv:1612.07862, 2016 - arxiv.org
This report presents a more detailed description of the algorithm and simulations published
in papers [1, 2]. It includes a step by step description of the algorithm and included the …
in papers [1, 2]. It includes a step by step description of the algorithm and included the …
Visual exploration of large hierarchies with information pyramids
K Andrews - Proceedings sixth international conference on …, 2002 - ieeexplore.ieee.org
Information pyramids compactly visualise large hierarchical structures in three dimensions
using pyramid-like structures, which grow upwards as the hierarchy deepens. A plateau …
using pyramid-like structures, which grow upwards as the hierarchy deepens. A plateau …
[PDF][PDF] Ant colony optimization of interval Type-2 Fuzzy C-Means with subtractive clustering and multi-round sampling for large data
Fuzzy C-Means (FCM) is widely accepted as a clustering technique. However, it cannot
often manage different uncertainties associated with data. Interval Type-2 Fuzzy C-Means …
often manage different uncertainties associated with data. Interval Type-2 Fuzzy C-Means …
Conceptual modeling of big data extract processes with UML
D Martinez-Mosquera, S Luján-Mora… - … and Computer Science …, 2017 - ieeexplore.ieee.org
Big Data is a popular term used to define the storage and processing of high volumes of
data. The main aim is to assist companies to make better business decisions. There is a lot …
data. The main aim is to assist companies to make better business decisions. There is a lot …
Data cleaning technique for security logs based on Fellegi-Sunter theory
Abstract Information security is one of the most important aspects an organization should
consider. Due to this matter and the variety of existing vulnerabilities, there are specialized …
consider. Due to this matter and the variety of existing vulnerabilities, there are specialized …
Horus testbed: Implementation of real-time video streaming protocols
A Abdelhadi, A Gerstlauer… - 2019 IEEE International …, 2019 - ieeexplore.ieee.org
The integration of communication, computing, and control in mobile cyberphysical systems
leads to many challenges. This is due to the complex interactions between these three …
leads to many challenges. This is due to the complex interactions between these three …
An approach to big data modeling for key-value NoSQL databases
The scientific community has a special interest in providing solutions to deal with a huge
amount of data generated by the Internet, mobile devices, and sensors, among others. One …
amount of data generated by the Internet, mobile devices, and sensors, among others. One …
Spatial coexistence of cooperative radar and communication systems
A Abdelhadi - … on Performance Evaluation and Modeling in …, 2019 - ieeexplore.ieee.org
Future generations of cellular systems need to meet stringent requirements for bandwidth
and latency. This entitles maximum utilization of the available wireless spectrum. Given that …
and latency. This entitles maximum utilization of the available wireless spectrum. Given that …