Showing 1–12 of 776 results

  • Placeholder

    ?Scalable continual top-k keyword search in relational databases

    0 out of 5
    4,500

    ?Scalable continual top-k keyword search in relational databases Abstract? Scalable continual top-k keyword search in relational databases. Video View Demo [numbers_sections number=”1″ title=”Including =Packages=” last=”no” ] Complete Source Code Complete Documentation Complete Presentation Slides Flow Diagram Database File Screenshots Execution Procedure Readme File Addons Video Tutorials Supporting Softwares [/numbers_sections] [numbers_sections number=”2″ title=”Our =Specialization=” last=”no” ]…

  • Placeholder

    ?TACI: Taxonomy-Aware Catalog Integration

    0 out of 5
    4,500

    ?TACI: Taxonomy-Aware Catalog Integration Abstract? TACI: Taxonomy-Aware Catalog Integration.A fundamental data integration task faced by online commercial portals and commerce search engines is the integration of products coming from multiple providers to their product catalogs. In this scenario, the commercial portal has its own taxonomy (the ?master taxonomy?), while each data provider organizes its products…

  • Placeholder

    A CBR-based Approach to ITIL-based Service Desk

    0 out of 5
    4,500

    A CBR-based Approach to ITIL-based Service Desk Abstract?During the last 20 years ITIL (IT Infrastructure Library) has been evolving with the latest version published in 2007. Incident Management and Problem Management are two main activities of ITIL service operation framework which handles incidents and their root causes respectively. Service Desk systems are software tools that…

  • A Cocktail Approach for Travel Package Recommendation

    0 out of 5
    4,500

    A Cocktail Approach for Travel Package Recommendation Abstract? Recent years have witnessed an increased interest in recommender systems. Despite significant progress in this field, there still remain numerous avenues to explore. Indeed, this paper provides a study of exploiting online travel information for personalized travel package recommendation. A critical challenge along this line is to…

  • A Cold Start Recommendation System Using Item Correlation and User Similarity

    0 out of 5
    4,500

    A Cold Start Recommendation System Using Item Correlation and User Similarity Abstract? Conventional recommendation systems tend to focus on variations of well-known information retrieval techniques. We took a fresh approach, rather than to follow the traditional, commonly applied recommendation methodology of creating a user-item matrix, and then using them to make recommendations. Instead, we established…

  • A Combination of Feature Extraction Methods with an Ensemble of Different Classifiers for Protein Structural Class Prediction Problem

    0 out of 5
    4,500

    A Combination of Feature Extraction Methods with an Ensemble of Different Classifiers for Protein Structural Class Prediction Problem Abstract? A Combination of Feature Extraction Methods with an Ensemble of Different Classifiers for Protein Structural Class Prediction Problem. Better understanding of structural class of a given protein reveals important information about its overall folding type and…

  • A combined mining-based framework for predicting telecommunications customer payment behaviors

    0 out of 5
    4,500

    A combined mining-based framework for predicting telecommunications customer payment behaviors Abstract?A combined mining-based framework for predicting telecommunications customer payment behaviors. Recommender systems are mostly well known for their applications in e-commerce sites and are mostly static models. Classical personalized recommender algorithm include collaborative filtering method applied in Amazon, matrix factorization algorithm from Netflix, < Final...

  • A Critical-time-point Approach to All-departure-time Lagrangian Shortest Paths

    0 out of 5
    4,500

    A Critical-time-point Approach to All-departure-time Lagrangian Shortest Paths Abstract? Given a spatio-temporal network, a source, a destination, and a desired departure time interval, the All-departure time Lagrangian Shortest Paths < Final Year Projects 2016 > ALSP problem determines a set which includes the shortest path for every departure time in the given interval. ALSP is…

  • A Data Mining Approach Combining K-Means Clustering with Bagging Neural Network for Short-term Wind Power Forecasting

    0 out of 5
    4,500

    A Data Mining Approach Combining K-Means Clustering with Bagging Neural Network for Short-term Wind Power Forecasting Abstract-Wind power forecasting (WPF) is significant to guide the dispatching of grid and the production planning of wind farm effectively. The intermittency and volatility of wind leading to the diversity of the training samples have a major impact on…

  • A Data Mining Approach Combining K-Means Clustering with Bagging Neural Network for Short-term Wind Power Forecasting

    0 out of 5
    4,500

    A Data Mining Approach Combining K-Means Clustering with Bagging Neural Network for Short-term Wind Power Forecasting Abstract-Wind power forecasting (WPF) is significant to guide the dispatching of grid and the production planning of wind farm effectively. The intermittency and volatility of wind leading to the diversity of the training samples have a major impact on…

  • A decision-theoretic rough set approach for dynamic data mining

    0 out of 5
    4,500

    A decision-theoretic rough set approach for dynamic data mining Abstract? Uncertainty and fuzziness generally exist in real-life data. Approximations are employed to describe the uncertain information approximately in rough set theory. Certain and uncertain rules are induced directly from different regions partitioned by approximations. Approximation can further be applied to data mining related task, e.g.,…

  • Product on sale

    A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection

    0 out of 5
    Original price was: ₹6,000.Current price is: ₹4,500.

    A Detailed Investigation and Analysis of using Machine Learning Techniques for Intrusion Detection Abstract-Intrusion detection is one of the important security problems in todays cyber world. A significant number of techniques have been developed which are based on machine learning approaches. However, they are not very successful in identifying all types of intrusions. In this…

End of content

End of content