Search Results - (( data evaluation study algorithm ) OR ( java application clustering algorithm ))
Search alternatives:
- application clustering »
- evaluation study »
- java application »
- data evaluation »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
2
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
3
-
4
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
A web-based implementation of k-means algorithms
Published 2022“…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
Performance evaluation of caching placement algorithms in named data network for video on demand service
Published 2016“…The purpose of this study is to evaluate the performance of caching placement algorithms (LCD, LCE, Prob, Pprob, Cross, Centrality, and Rand) in Named Data Network (NDN) for Video on Demand (VoD). …”
Get full text
Get full text
Get full text
Thesis -
8
Performance evaluation for different data encryption algorithms on wireless sensor network (WSN)
Published 2018“…The results of evaluation AES, SF and SIT algorithms in terms of encrypted data size (bytes) showed that, the SIT algorithm produce the lowest size for all encrypted Images which is below 90250bytes. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
Published 2023Get full text
Get full text
Undergraduates Project Papers -
10
Analysis of string matching compression algorithms
Published 2008“…This project evaluates the performance of the compression algorithms in order to increase the performance of memory access. …”
Get full text
Get full text
Article -
11
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…Our evaluation suggests that the proposed algorithm can be approximately 39.9% more efficient than its counterparts for various data sets in terms of computational time.…”
Get full text
Get full text
Article -
12
Hybrid performance measures and mixed evaluation method for data classification problems
Published 2012“…Second, this study evaluates the current evaluation practices for evaluating and comparing the two performance measures. …”
Get full text
Get full text
Thesis -
13
Multistep forecasting for highly volatile data using new algorithm of Box-Jenkins and GARCH
Published 2018“…This study is proposing a new algorithm of Box-Jenkins and GARCH (or BJ-G) in evaluating the multistep forecasting performance of the BJ-G model for highly volatile time series data. …”
Get full text
Get full text
Conference or Workshop Item -
14
Sentiment analysis of domestic violence prediction using Naive Bayes algorithm / Nurulizzah Mohd Rahiman
Published 2024“…The research objectives focus on studying and applying the Naive Bayes algorithm for sentiment analysis on tweets related to domestic violence, aiming to provide insights for researchers, government agencies, policymakers, and the public and develop a prediction model using Naive Bayes algorithm to evaluate its performance. …”
Get full text
Get full text
Thesis -
15
Evaluating machine learning algorithms for sentiment analysis: a comparative study to support data-driven decision making
Published 2025“…The primary objective is to assess the performance of these models across various domains and datasets in sentiment analysis tasks. The study employs data from the IMDb 500k movie reviews dataset, utilizing machine learning techniques for sentiment classification. …”
Get full text
Get full text
Get full text
Article -
16
Validation on an enhanced dendrite cell algorithm using statistical analysis
Published 2017“…Evaluating a novel or enhanced algorithm is compulsory in data mining studies in order to measure it has superior performance than its previous version. …”
Get full text
Get full text
Get full text
Article -
17
Sentiment analysis for malay newspaper (SAMNews) using negative selection algorithm / Nur Amalina Redzuan
Published 2013“…This project is implemented based on five phases in methodology part which consists of background study, data collection and preparation, prototype design, prototype development and evaluation and dociunentation. …”
Get full text
Get full text
Thesis -
18
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…In this study an inverse procedure algorithm is proposed in the time domain to evaluate lightning return stroke current based on measured electromagnetic fields at an observation point. …”
Get full text
Get full text
Article -
19
Analytical Study Of Machine Learning Models For Stock Trading In Malaysian Market
Published 2024“…Therefore, this study focused to contribute on evaluating different algorithm models such as traditional ML and deep learning models with big stock data of multiple parameters from selected companies in Bursa Malaysia. …”
thesis::master thesis -
20
An Experiment of Ant Algorithms : Case Study of Kota Kinabalu Central Town
Published 2005“…The objectives of this study are to explore and evaluate the Ant System (AS) algorithm and Ant Colony System (ACS) algorithm in finding shortest paths. …”
Get full text
Get full text
Get full text
Thesis
