Search Results - (( data processing modified algorithm ) OR ( java application bees algorithm ))

Refine Results
  1. 1

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…Generally, the proposed modified k-means algorithm is able to determine the optimum number of clusters for huge data.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Fuzzy clustering method and evaluation based on multi criteria decision making technique by Sameer, Fadhaa Othman

    Published 2018
    “…The proposed algorithm is used as a pre-processing method for data followed by Gustafson-Kessel (GK) algorithm to classify credit scoring data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A modified π rough k-means algorithm for web page recommendation system by Zidane, Khaled Ali Othman

    Published 2018
    “…Secondly, a modified πRKM algorithm is proposed to partition the user session data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    M-Factors Fuzzy Time Series for Forecasting Moving Holiday Electricity Load Demand in Malaysia (S/O 14589) by Mansor, Rosnalini, Mat Kasim, Maznah, Othman, Mahmod, Zaini, Bahtiar Jamili

    “…The modified algorithm, Weighted Subsethood Segmented Fuzzy Time Series (WeSuSFTS) consists of four main phases; data pre-processing, model development, model implementation and model evaluation. …”
    Get full text
    Get full text
    Monograph
  5. 5

    Facial features point localization using modified SIFT scale space / Zulfikri Paidi by Paidi, Zulfikri

    Published 2020
    “…The third test on facial expression recognition process showed that the modified SIFT give more stable result than the results of the SIFT algorithm when the tests are performed on two different databases.…”
    Get full text
    Get full text
    Thesis
  6. 6

    Modified HOS based Eigenvector algorithm for improvement of poor SNR of Seismic data by A.F.M., Hani, M.S., Younis

    Published 2007
    “…Distortion and convolution noise effectively. Performance of the modified algorithm indicates its effectiveness for signals with dominant Gaussian/color Gaussian noise. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Modified word representation vector based scalar weight for contextual text classification by Abbas Saliimi, Lokman

    Published 2024
    “…To validate this algorithm, the modified word vectors are compared with original LLM-generated word vectors to evaluate their reflection of the intended context. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    An ensemble of neural network and modified grey wolf optimizer for stock prediction by Das, Debashish

    Published 2019
    “…This update process may cause the algorithm to fall to local optima especially in the cases where there are many competing local optima. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Weighted subsethood and reasoning based fuzzy time series for moving holiday electricity load demand forecasting by Rosnalini, Mansor

    Published 2021
    “…The modified algorithm, Weighted Subsethood Segmented Fuzzy Time Series (WeSuSFTS) consists of four main phases; data pre-processing, model development, model implementation and model evaluation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A modified approach to improve the performance of AES using feistel structure by Al-Ansi, Afeef Yahya Ahmed

    Published 2018
    “…In encryption algorithm design, apart from the security performance, processing performance and the cost of the implementation are very important trade-off parameters. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Improving on the network lifetime of clustered-based wireless sensor network using modified leach algorithm by Zeni, Saltihie

    Published 2012
    “…Then, the modified LEACH algorithm was proposed where the improvement was done in cluster head selection based on LEACH. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim by Abdul Rahim, Nur Azimah

    Published 2018
    “…It can be concluded that the modified algorithm decreases the biases, the variances and the mean squared errors of the LTS estimators. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    System identification using Extended Kalman Filter by Alias, Ahmad Hafizi

    Published 2017
    “…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
    Get full text
    Get full text
    Student Project
  18. 18

    Temporal video segmentation using squared form of Krawtchouk-Tchebichef moments by Abdulhussain, Sadiq H.

    Published 2018
    “…This growth necessitates to look for superior techniques in processing data content. Video contains a lot of useful information; however, it consumes a vast storage space. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A Modified ACO-based Search Algorithm for Detecting Protein Functional Module From Protein Interaction Network by Jamaludin, Sallim, Rozlina, Mohamed, Roslina, Abd Hamid

    Published 2015
    “…Some shortcomings were identified and addressed by proposing a Modified Ant Colony Optimization Algorithm (ACO-PFMDM), which introduces two new scheme for controlling the two main parameters of ACO to solve PFMDP. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Enhanced AES algorithm based on 14 rounds in securing data and minimizing processing time by Mohd Ariffin, Noor Afiza, Ahmed Ashawesh, Aymen Yousef

    Published 2021
    “…This paper propose a Secured Modified Advanced Encryption Standard Algorithm with decreasing the rounds of Advanced Encryption Standard (AES) to 14 rounds in order to minimize encryption and decryption process time and increasing digital data security as well. …”
    Get full text
    Get full text
    Get full text
    Article