University of Westminster

Displaying 1-10 of 10 results

  • White Papers // Jan 2014

    Mining Web Sequential Patterns Incrementally with Revised PLWAP Tree

    Since point and click at web pages generate continuous data stream, which flow into web log data, old patterns may be stale and need to be updated. Algorithms for mining web sequential patterns from scratch include WAP, PLWAP and apriori-based GSP. An incremental technique for updating already mined patterns when...

    Provided By University of Westminster

  • White Papers // Jan 2014

    Incremental Mining of Web Sequential Patterns Using PLWAP Tree on Tolerance MinSupport

    In this paper, the authors propose an algorithm, PL4UP, which uses the PLWAP tree structure to incrementally update web sequential patterns. PL4UP initially builds a bigger PLWAP tree that includes all sequences in the database with a tolerance support, t, that is a fraction of the database minimum support, s....

    Provided By University of Westminster

  • White Papers // Jul 2011

    A Framework for Security-Enhanced Peer-to-Peer Applications in Mobile Cellular Networks

    Due to the dual trends of increasing cellular network transmission capacity and coverage as well as improving computational capacity, storage and intelligence of mobile handsets, Mobile Peer-To-Peer (MP2P) networking is emerging an attractive research field in recent years. However, these trends have not been clearly articulated in perspective of both...

    Provided By University of Westminster

  • White Papers // Apr 2011

    A Branch and Price Approach for Optimal Regenerator Placement in Translucent Networks

    In a translucent optical network, the optical signal is regenerated at selected nodes of the network, before the signal quality degrades below a threshold. Given the optical reach, to minimize the network cost, the goal of the regenerator placement problem is to find the minimum number of regenerators necessary in...

    Provided By University of Westminster

  • White Papers // Oct 2009

    Feedback Based Real-Time MAC (RT-MAC) Protocol for Wireless Sensor Networks

    In this paper, the authors present a MAC layer protocol, called RTMAC, for real-time data streaming in Wireless Sensor Networks. RT-MAC eliminates need to contend for a wireless medium by potential transmitting nodes in a range by introducing feedback control packet, called Clear Channel (CC). RT-MAC maximizes spatial channel reuse...

    Provided By University of Westminster

  • White Papers // Apr 2009

    Drivers and Barriers to Business Intelligence Adoption: A Case of Pakistan

    This paper deals with the Drivers and Barriers to Business Intelligence Adoption. The Drivers and Barrier Methodology (DBM) is a useful tool for measuring how a particular technology such as Business Intelligence (BI) brings tangible benefits to a business enterprise such as a Consumer Bank or Telecommunications Company. This research...

    Provided By University of Westminster

  • White Papers // Feb 2008

    Timed Transition Discovery From Web Service Conversation Logs

    Web service business protocols are of importance to both clients and providers, as they model the external behaviour of services. However, the business protocol is not always published together with the service interface, and this hinders automatic management. When conversation logs are available, a solution is to discover the business...

    Provided By University of Westminster

  • White Papers // Jan 2007

    SSM : A Frequent Sequential Data Stream Patterns Miner

    Data stream applications like sensor network data, click stream data, have data arriving continuously at high speed rates and require online mining process capable of delivering current and near accurate results on demand without full access to all historical stored data. Frequent sequential mining is the process of discovering frequent...

    Provided By University of Westminster

  • White Papers // Oct 2006

    Generic Query Toolkit: A Query Interface Generator Integrating Data Mining

    Construction of flexible query interface constitutes a very important part in the design of information systems. The major goal is that new queries can easily be built by either the developers or the end-users of information systems. Some information systems would provide a list of predefined queries and future additional...

    Provided By University of Westminster

  • White Papers // May 2006

    Cleaning Web Pages for Effective Web Content Mining

    Classifying and mining noise-free web pages will improve on accuracy of search results as well as search speed, and may benefit web-page organization applications (e.g., keyword-based search engines and taxonomic web page categorization applications). Noise on web pages is irrelevant to the main content on the web pages being mined,...

    Provided By University of Westminster

  • White Papers // Apr 2011

    A Branch and Price Approach for Optimal Regenerator Placement in Translucent Networks

    In a translucent optical network, the optical signal is regenerated at selected nodes of the network, before the signal quality degrades below a threshold. Given the optical reach, to minimize the network cost, the goal of the regenerator placement problem is to find the minimum number of regenerators necessary in...

    Provided By University of Westminster

  • White Papers // Oct 2009

    Feedback Based Real-Time MAC (RT-MAC) Protocol for Wireless Sensor Networks

    In this paper, the authors present a MAC layer protocol, called RTMAC, for real-time data streaming in Wireless Sensor Networks. RT-MAC eliminates need to contend for a wireless medium by potential transmitting nodes in a range by introducing feedback control packet, called Clear Channel (CC). RT-MAC maximizes spatial channel reuse...

    Provided By University of Westminster

  • White Papers // Apr 2009

    Drivers and Barriers to Business Intelligence Adoption: A Case of Pakistan

    This paper deals with the Drivers and Barriers to Business Intelligence Adoption. The Drivers and Barrier Methodology (DBM) is a useful tool for measuring how a particular technology such as Business Intelligence (BI) brings tangible benefits to a business enterprise such as a Consumer Bank or Telecommunications Company. This research...

    Provided By University of Westminster

  • White Papers // Jul 2011

    A Framework for Security-Enhanced Peer-to-Peer Applications in Mobile Cellular Networks

    Due to the dual trends of increasing cellular network transmission capacity and coverage as well as improving computational capacity, storage and intelligence of mobile handsets, Mobile Peer-To-Peer (MP2P) networking is emerging an attractive research field in recent years. However, these trends have not been clearly articulated in perspective of both...

    Provided By University of Westminster

  • White Papers // Feb 2008

    Timed Transition Discovery From Web Service Conversation Logs

    Web service business protocols are of importance to both clients and providers, as they model the external behaviour of services. However, the business protocol is not always published together with the service interface, and this hinders automatic management. When conversation logs are available, a solution is to discover the business...

    Provided By University of Westminster

  • White Papers // May 2006

    Cleaning Web Pages for Effective Web Content Mining

    Classifying and mining noise-free web pages will improve on accuracy of search results as well as search speed, and may benefit web-page organization applications (e.g., keyword-based search engines and taxonomic web page categorization applications). Noise on web pages is irrelevant to the main content on the web pages being mined,...

    Provided By University of Westminster

  • White Papers // Oct 2006

    Generic Query Toolkit: A Query Interface Generator Integrating Data Mining

    Construction of flexible query interface constitutes a very important part in the design of information systems. The major goal is that new queries can easily be built by either the developers or the end-users of information systems. Some information systems would provide a list of predefined queries and future additional...

    Provided By University of Westminster

  • White Papers // Jan 2007

    SSM : A Frequent Sequential Data Stream Patterns Miner

    Data stream applications like sensor network data, click stream data, have data arriving continuously at high speed rates and require online mining process capable of delivering current and near accurate results on demand without full access to all historical stored data. Frequent sequential mining is the process of discovering frequent...

    Provided By University of Westminster

  • White Papers // Jan 2014

    Mining Web Sequential Patterns Incrementally with Revised PLWAP Tree

    Since point and click at web pages generate continuous data stream, which flow into web log data, old patterns may be stale and need to be updated. Algorithms for mining web sequential patterns from scratch include WAP, PLWAP and apriori-based GSP. An incremental technique for updating already mined patterns when...

    Provided By University of Westminster

  • White Papers // Jan 2014

    Incremental Mining of Web Sequential Patterns Using PLWAP Tree on Tolerance MinSupport

    In this paper, the authors propose an algorithm, PL4UP, which uses the PLWAP tree structure to incrementally update web sequential patterns. PL4UP initially builds a bigger PLWAP tree that includes all sequences in the database with a tolerance support, t, that is a fraction of the database minimum support, s....

    Provided By University of Westminster