Search Results - (( developing estimation clustering algorithm ) OR ( java implementation modified algorithm ))
Search alternatives:
- implementation modified »
- developing estimation »
- estimation clustering »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
Get full text
Get full text
Thesis -
3
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…For floor localisation, the strategy is based on developing the algorithm to determine the floor by utilising fingerprint clustering technique. …”
Get full text
Get full text
Thesis -
4
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
Get full text
Get full text
Article -
5
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis -
6
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
7
An investigation of structural breaks on spot and futures crude palm oil returns
Published 2011“…The implications of omitting structural break in volatility clustering modelling process are largely discussed in various developed macroeconomic and finance variables. …”
Get full text
Get full text
Article -
8
Improved robust estimator and clustering procedures for multivariate outliers detection
Published 2023“…The development of robust estimators still continues until now. …”
Get full text
Get full text
Thesis -
9
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
10
An estimation algorithm for improved maritime obstacle detection
Published 2024“…Utilizing a pre-trained YOLOv8L model, the ZED2I camera identifies objects and estimates distances using RGB and depth data. The LiDAR system, developed in Python and C++, features adaptive clustering and an obstacle detector, aligning its point cloud to a 110-degree field of view to match the camera's perspective. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
11
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
12
Density based subspace clustering: a case study on perception of the required skill
Published 2014“…This research aims to develop an improved model for subspace clustering based on density connection. …”
Get full text
Get full text
Thesis -
13
Modified archive update mechanism of multi-objective particle swarm optimization in fuzzy classification and clustering
Published 2022“…Moreover, interpretability also recorded better results on testing problems, where most of the number of rules were fewer than 33. A clustering algorithm based on MOPSO-CD with a modified archive update mechanism (MCPSO-CD) was used to estimate the optimal number of clusters. …”
Get full text
Get full text
Thesis -
14
Density subspace clustering: a case study on perception of the required skill
Published 2014“…This research aims to develop an improved model for subspace clustering based on density connection. …”
Get full text
Get full text
Thesis -
15
Trade-off between energy efficiency and collisions for MAC protocols of wireless sensor network
Published 2015“…Simulation models have been developed and simulated to verify the performance improvements of the proposed algorithms. …”
Get full text
Get full text
Thesis -
16
An improved machine learning model of massive Floating Car Data (FCD) based on Fuzzy-MDL and LSTM-C for traffic speed estimation and prediction
Published 2023“…In the second method, a new traffic estimation method is proposed using Fuzzy C-Mean (FCM) clustering and Minimum Description Length (MDL). …”
Get full text
Get full text
Get full text
Thesis -
17
EZ-SEP: extended Z-SEP routing protocol with hierarchical clustering approach for wireless heterogeneous sensor network
Published 2021“…In addition, EZ-SEP is weighted up using various estimation schemes such as base station repositioning, altering the field density, and variable nodes energy for comparison with the previous parent algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security
Published 2023“…After collecting the data from above mentioned sensors we applied machine learning algorithms DBSCAN to cluster the data points and K-NN classification to classify those clusters in one-dimensional data, but the results were not much satisfying. …”
Get full text
Get full text
Article -
19
RECURSIVE LEARNING ALGORITHMS ON RBF NETWORKS FOR NONLINEAR SYSTEM IDENTIFICATION
Published 2010“…Science and technology development has the tendency of learning from nature where human also try to develop artificial intelligent by imitating biological neuron network which is popularly termed Artificial Neural Network (ANN). …”
Get full text
Get full text
Get full text
Thesis -
20
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
