International Journal of Business Intelligence and Data Mining (IJBIDM)

International Journal of Business Intelligence and Data Mining

2019 Vol.14 No.1/2

Special Issue on: Applied Soft Computing Strategies for Effective Business Data Analytics

Guest Editors: Prof. Nagaraj Balakrishnan, Prof. Danilo Pelusi and Prof. Joy I-Z. Chen

Editorial

Pages Title and author(s)
3-12Effective optimisation of Honda algorithm for rear end collision avoidance system with genetic algorithm
K.G. Manjunath; N. Jaisankar
DOI: 10.1504/IJBIDM.2019.096845
13-24Comparison between optimised genetic-based Honda algorithm and Honda algorithm for collision avoidance system
K.G. Manjunath; N. Jaisankar
DOI: 10.1504/IJBIDM.2019.096843
25-39A novel multi-class ensemble model based on feature selection using Hadoop framework for classifying imbalanced biomedical data
Thulasi Bikku; N. Sambasiva Rao; Ananda Rao Akepogu
DOI: 10.1504/IJBIDM.2019.096801
40-53Network affinity aware energy efficient virtual machine placement algorithm
R. Ranjana; S. Radha; J. Raja
DOI: 10.1504/IJBIDM.2019.096803
54-61Dynamic runtime protection technique against the file system injecting malwares
Easwaramoorthy Arul; Venugopal Manikandan
DOI: 10.1504/IJBIDM.2019.096809
62-88An efficient clustering approach for fair semantic web content retrieval via tri-level ontology construction model with hybrid dragonfly algorithm
R. Bhavani; V. Prakash; K. Chitra
DOI: 10.1504/IJBIDM.2019.096836
89-105Knowledge transfer for efficient cross domain ranking using AdaRank algorithm
N. Geetha; P.T. Vanathi
DOI: 10.1504/IJBIDM.2019.096808
106-120Enhanced R package-based cluster analysis fault identification models for three phase power system network
K. Nithiyananthan; Pratap Nair; Raman Raguraman; Tan Yong Sing; Syahrel Emran Bin Siraj
DOI: 10.1504/IJBIDM.2019.096844
121-137Probabilistic variable precision fuzzy rough set technique for discovering optimal learning patterns in e-learning
K.S. Bhuvaneshwari; D. Bhanu; S. Sophia; S. Kannimuthu
DOI: 10.1504/IJBIDM.2019.096807
138-154Enhancing the JPEG image steganography security by RSA and attaining high payload using advanced DCT replacement method and modified quantisation table
J. Hemalatha; M.K. Kavitha Devi; S. Geetha
DOI: 10.1504/IJBIDM.2019.096812
155-176A fuzzy approach to prioritise DEA ranked association rules
Shekhar Shukla; B.K. Mohanty; Ashwani Kumar
DOI: 10.1504/IJBIDM.2019.096842
177-198BAIT: behaviour aided intruder testimony technique for attacker intention prediction in business data handling
K. Narasimha Mallikarjunan; S. Mercy Shalinie; A. Bhuvaneshwaran
DOI: 10.1504/IJBIDM.2019.096835
199-217A secured best data centre selection in cloud computing using encryption technique
A. Prabhu; M. Usha
DOI: 10.1504/IJBIDM.2019.096804
218-237Minimal constraint based cuckoo search algorithm for removing transmission congestion and rescheduling the generator units
N. Chidambararaj; K. Chitra
DOI: 10.1504/IJBIDM.2019.096796
238-253Modelling economic choice under radical uncertainty: machine learning approaches
Anton Gerunov
DOI: 10.1504/IJBIDM.2019.096794
254-266OLAP technology and machine learning as the tools for validation of the numerical models of convective clouds
Elena N. Stankova; Andrey V. Balakshiy; Dmitry A. Petrov; Vladimir V. Korkhov; Andrey V. Shorov
DOI: 10.1504/IJBIDM.2019.096793
267-298Data cubes retrieval and design in OLAP systems: from query analysis to visualisation tool
Rahma Djiroun; Kamel Boukhalfa; Zaia Alimazighi
DOI: 10.1504/IJBIDM.2019.096813