


default search action
International Journal of Business Intelligence and Data Mining, Volume 14
Volume 14, Numbers 1/2, 2019
- K. G. Manjunath, Natarajan Jaisankar:

Effective optimisation of Honda algorithm for rear end collision avoidance system with genetic algorithm. 3-12 - K. G. Manjunath, Natarajan Jaisankar:

Comparison between optimised genetic-based Honda algorithm and Honda algorithm for collision avoidance system. 13-24 - Thulasi Bikku

, N. Sambasiva Rao, Ananda Rao Akepogu:
A novel multi-class ensemble model based on feature selection using Hadoop framework for classifying imbalanced biomedical data. 25-39 - R. Ranjana, S. Radha, J. Raja

:
Network affinity aware energy efficient virtual machine placement algorithm. 40-53 - Easwaramoorthy Arul

, Venugopal Manikandan:
Dynamic runtime protection technique against the file system injecting malwares. 54-61 - R. Bhavani

, V. Prakash
, K. Chitra:
An efficient clustering approach for fair semantic web content retrieval via tri-level ontology construction model with hybrid dragonfly algorithm. 62-88 - N. Geetha, P. T. Vanathi:

Knowledge transfer for efficient cross domain ranking using AdaRank algorithm. 89-105 - K. Nithiyananthan, Pratap Nair, Raman Raguraman, Tan Yong Sing, Syahrel Emran Bin Siraj:

Enhanced R package-based cluster analysis fault identification models for three phase power system network. 106-120 - K. S. Bhuvaneshwari, D. Bhanu, S. Sophia, S. Kannimuthu

:
Probabilistic variable precision fuzzy rough set technique for discovering optimal learning patterns in e-learning. 121-137 - J. Hemalatha

, M. K. Kavitha Devi
, S. Geetha
:
Enhancing the JPEG image steganography security by RSA and attaining high payload using advanced DCT replacement method and modified quantisation table. 138-154 - Shekhar Shukla, Bhaba Krishna Mohanty, Ashwani Kumar:

A fuzzy approach to prioritise DEA ranked association rules. 155-176 - K. Narasimha Mallikarjunan, S. Mercy Shalinie

, A. Bhuvaneshwaran
:
BAIT: behaviour aided intruder testimony technique for attacker intention prediction in business data handling. 177-198 - A. Prabhu

, M. Usha:
A secured best data centre selection in cloud computing using encryption technique. 199-217 - N. Chidambararaj, K. Chitra

:
Minimal constraint based cuckoo search algorithm for removing transmission congestion and rescheduling the generator units. 218-237 - Anton A. Gerunov

:
Modelling economic choice under radical uncertainty: machine learning approaches. 238-253 - Elena N. Stankova, Andrey V. Balakshiy, Dmitry A. Petrov, Vladimir V. Korkhov

, Andrey V. Shorov:
OLAP technology and machine learning as the tools for validation of the numerical models of convective clouds. 254-266 - Rahma Djiroun, Kamel Boukhalfa

, Zaia Alimazighi:
Data cubes retrieval and design in OLAP systems: from query analysis to visualisation tool. 267-298
Volume 14, Number 3, 2019
- Preeti A. Bailke

, S. T. Patil:
Distributed algorithms for improved associative multilabel document classification considering reoccurrence of features and handling minority classes. 299-321 - Vijayalakshmi Balasubramanian, Sugumar Rajendran:

Rough set theory-based feature selection and FGA-NN classifier for medical data classification. 322-358 - J. Anitha, P. V. G. D. Prasad Reddy, M. S. Prasad Babu:

Error tolerant global search incorporated with deep learning algorithm to automatic Hindi text summarisation. 359-380 - S. Ephina Thendral, Valliyammai Chinnaiah

:
A distributed cross layer recommender system incorporating product diffusion. 381-400 - M. T. Ketthari, Sugumar Rajendran:

Privacy preserving data mining using hiding maximum utility item first algorithm by means of grey wolf optimisation algorithm. 401-418
Volume 14, Number 4, 2019
- Amril Nazir:

A critique of imbalanced data learning approaches for big data analytics. 419-457 - A. Santhana Vijayan

, S. R. Balasundaram:
Fuzzy-MCS algorithm-based ontology generation for e-assessment. 458-472 - J. P. Nivash, L. D. Dhinesh Babu

:
Effective discovery of missing links in citation networks using citation relevancy check process. 473-488 - T. Srikanth, M. Shashi:

An effective preprocessing algorithm for model building in collaborative filtering-based recommender system. 489-503 - M. Manickam, N. Ramaraj, C. Chellappan:

A combined PFCM and recurrent neural network-based intrusion detection system for cloud environment. 504-527 - Rachana Mehta

, Keyur Rana
:
Evolution of singular value decomposition in recommendation systems: a review. 528-547

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














