Search Results - (( generation classification clustering algorithm ) OR ( java implementation model algorithm ))
Search alternatives:
- generation classification »
- classification clustering »
- implementation model »
- java implementation »
- model algorithm »
-
1
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…This algorithm was compared to co-spectral plot method for labelling clusters the clusters generated in Landsat TM dataset. …”
Get full text
Get full text
Thesis -
2
An ensemble data summarization approach based on feature transformation to learning relational data
Published 2015“…A genetic algorithm (GA) is also used to find the best centroids for all the clusters generated cluster centroids. …”
Get full text
Get full text
Get full text
Thesis -
3
Gas Identi cation by Using a Cluster-k-Nearest-Neighbor
Published 2009“…We find 98.7% of accuracy in the classification of 6 different types of Gas by using K-means cluster algorithm and we find almost the same by using the new clustering algorithm.…”
Get full text
Get full text
Article -
4
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
5
A review: accuracy optimization in clustering ensembles using genetic algorithms
Published 2011“…It combines multiple partitions generated by different clustering algorithms into a single clustering solution. …”
Get full text
Get full text
Get full text
Article -
6
Modified archive update mechanism of multi-objective particle swarm optimization in fuzzy classification and clustering
Published 2022“…It was superior to the clustering algorithm methods in most real-world datasets with means ARI of over 0.35. …”
Get full text
Get full text
Thesis -
7
A review on data stream classification
Published 2018“…As such the typical tasks of searching data have been linked to streams of data that are inclusive of clustering, classification, and repeated mining of pattern. …”
Get full text
Get full text
Get full text
Article -
8
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
9
Topological Clustering via Adaptive Resonance Theory With Information Theoretic Learning
Published 2019“…Other types of the ART-based topological clustering algorithms have been developed, however, these algorithms have various drawbacks such as a large number of parameters, sensitivity to noisy data. …”
Get full text
Get full text
Article -
10
A hybrid-based modified adaptive fuzzy inference engine for pattern classification
Published 2011“…A TSK type fuzzy inference system is constructed by the automatic generation of membership functions and rules by the hybrid fuzzy clustering and Apriori algorithm technique, respectively. …”
Get full text
Get full text
Conference or Workshop Item -
11
Design and analysis of management platform based on financial big data
Published 2023“…In order to make financial big data generate business value and improve the information application level of financial management, aiming at the high error rate of current financial data classification system, this article adopts the fuzzy clustering algorithm to classify financial data automatically, and adopts the local outlier factor algorithm with neighborhood relation (NLOF) to detect abnormal data. …”
Get full text
Get full text
Get full text
Article -
12
Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar
Published 2015“…The objectives of this project are to use FCM as the clustering algorithm to establish TLPs. The optimal number of cluster for FCM is obtained through cluster validity analysis. …”
Get full text
Get full text
Thesis -
13
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Based on the above components and circumstances, many studies have been performed on data clustering problems. Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
14
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
15
A Review on Data Stream Classification
Published 2018“…As such the typical tasks of searching data have been linked to streams of data that are inclusive of clustering, classification, and repeated mining of pattern. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Whale optimization algorithm based on tent chaotic map for feature selection in soft sensors
Published 2025“…The soft sensor was designed using several stages, including data collection, preprocessing, clustering, feature selection, and classification. The proposed TWOA achieved a higher fault classification result of 99.98% compared to other algorithms.…”
Get full text
Get full text
Get full text
Article -
17
MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM
Published 2011“…The experimental result shows that the proposed hybrid k-mean plus MFP algorithm can generate more useful pattern from large stock data.…”
Get full text
Get full text
Citation Index Journal -
18
An enhanced malay named entity recognition using clustering and classification approach for crime textual data analysis
Published 2018“…This Malay Named Entity Recognition (MNER) technique is proposed by using multi-staged of clustering and classification methods. The methods are Fuzzy C-Means and K-Nearest Neighbors Algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013“…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
Get full text
Get full text
Conference or Workshop Item -
20
Classification of metamorphic virus using n-grams signatures
Published 2020“…This research was conducted using Second Generation virus dataset. The first step is the classification model to cluster the metamorphic virus using TF-IDF technique. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
