Search Results - (( developing mitigation clustering algorithm ) OR ( java implication tree algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practices by Rahman, Md. Arafatur, Nafees, Zaman, A. Taufiq, Asyhari, Al-Turjman, Fadi, Alam Bhuiyan, Md. Zakirul, Mohamad Fadli, Zolkipli

    Published 2020
    “…To mitigate such an impact, this paper proposes a data-driven dynamic clustering framework for moderating the adverse economic impact of COVID-19 flare-up. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Optimised content-social based features for fake news detection in social media using text clustering approach by Yahya, Adnan Hussein Ali

    Published 2025
    “…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj by Bryan Raj , Peter Jabaraj

    Published 2023
    “…Moreover, two improvised clustering techniques are introduced to reduce the energy overhead cost from the re-clustering process. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    An Effective Power Dispatch Strategy for Clustered Micro-grids while Implementing Optimal Energy Management and Power Sharing Control using Power Line Communication by Ahmed Mohamed, Ahmed Haidar, Adila, Fakhar, Muttaqi, Kashem M

    Published 2019
    “…This paper proposes an effective power dispatch strategy for clustered micro-grids. The developed hybrid algorithm implements optimal energy management and power sharing control using binary data. …”
    Get full text
    Get full text
    Get full text
    Proceeding
  5. 5