In one example, a method comprising: receiving a plurality of positions corresponding to the mobile computing devices previously located at a plurality of location identifiers computing device; by the computing
Clustering analysis, as one of the important methods in data mining technology, merely provides a method for the research and analysis of large amounts of data. Starting with the most important nodes, this paper divides clustering based on data field characteristics. The sensitivity pruning algorithm...
In recent years, some scholars have introduced machine learning algorithms to predict traffic flow. For example, a Bayesian clustering ensemble Gaussian process method is employed to solve the problem of extracting traffic attributes, and the weighted average is used to obtain accurate traffic flow pre...
is known for its simplicity and effectiveness. However, SO can underperform in certain cases, exhibiting slow convergence and a tendency to get trapped in local optima. To address these shortcomings, this paper proposes a multi-strategy improved snake optimizer (ISO). During the exploration phase...
2022, Pervasive and Mobile Computing Citation Excerpt : In addition, optimizations and load balancing inside WSN plays a major role in enhancing the network life time [12–15]. Moreover, clustering [16–18] would be a topological control technique designed to reduce the activity of SN transceive...
Unsupervised Clustering algorithms group unlabeled data such that grouped data points are more similar to each other than to other groups according to some metric [34], [41]. Association Rules are frequently used in data analysis for understanding relations between features according to some metric ...
Cheng P, Han M, Liu G (2023) DESC-IDS: Towards an efficient real-time automotive intrusion detection system based on deep evolving stream clustering. Future Gener Comput Syst 140:266–281. https://doi.org/10.1016/j.future.2022.10.020 Cheng P, Hua L, Jiang H, Liu G (2024) Lsf-idm...
This approach uses a fixed width clustering algorithm for efficient detection of the anomalies inthe MANET traffic and also for detecting newer attacks generated . In the association process, theAdaptive Association Rule mining algorithm is utilized. This helps to overcome the more time taken for...
Keywords Visualisation Data streams Data mining Clustering Mobile computing Adaptive clutter reduction View PDFReferences [1] Alfredo Cuzzocrea, Domenico Saccà, Paolo Serafino Semantics-aware advanced OLAP visualization of multidimensional data cubes Int. J. Data Warehous. Min., 3 (4) (2007), pp. ...
Data-driven methods involved in the construction of ANFIS are commonly based on the clustering of sets of numerical data available of the unidentified patterns/variables to be predicted or approximated (Mrinal, 2008). Since the development of ANFIS, it is mostly used for solving problems such as...