Search Results - (( evolution identification clustering algorithm ) OR ( java application force algorithm ))

  • Showing 1 - 4 results of 4
Refine Results
  1. 1

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Species distribution and molecular variations in drogonflies (order: odonata) within the state of Selangor, Malaysia / Noorhidayah Binti Mamat by Noorhidayah, Mamat

    Published 2013
    “…Opposite to suborder Zygoptera, they were resolved clustered into 2 clusters, paraphyletic group. The distinct separation between cluster Anisoptera and Zygoptera with confidence level 72% in the NJ analyses while 90% in MP analyses. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  4. 4

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis