Search Results - (( java application clustering algorithm ) OR ( using activity based algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  2. 2

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  3. 3
  4. 4

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Clustering chemical data set using particle swarm optimization based algorithm by Triyono, Triyono

    Published 2008
    “…In this study, Particle Swarm Optimization (PSO) based clustering algorithm is exploited to optimize the results of other clustering algorithm such as K-means. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    The swarm-based exploration algorithm with expanded circle pattern for searching activities by Zuhri, Muhammad Fuad Reza, Zahari, Ammar, Desia, Recky, Ismail , Amelia Ritahani, Al Haek, Mohammed

    Published 2015
    “…In this paper, we propose an exploration algorithm using quadcopter in simulation to discover an unknown area that is based on the expanding circle pattern for searching activities. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Hybrid anti-islanding algorithm for utility interconnection of distributed generation by Abdolrasol, M.G.M., Mekhilef, Saad

    Published 2009
    “…This algorithm is based on two detection schemes; namely active and passive. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Active intelligent control of vibration of flexible plate structures by Md Salleh, Salihatun

    Published 2011
    “…However, the non-model based AVC algorithms are faster than their model-based AVC counterparts.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Activity recognition using one-versus-all strategy with relief-f and self-adaptive algorithm by Zainudin, Muhammad Noorazlan Shah, Sulaiman, Md. Nasir, Mustapha, Norwati, Perumal, Thinagaran

    Published 2018
    “…Experiments were carried out to study the performance of our proposed algorithm using publicly activity datasets namely Physical Activity Monitoring for Aging People. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…Jogging activity recognition using the k-NN algorithm is a system that can help users collect information data of user speed movement using speed sensor and give the classification of jogging activity to the user. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Active power optimization based on non adaptive immune algorithm: article by Md. Saleh, Nurhayati, Musirin, Ismail

    Published 2010
    “…This paper presents a study of active power optimization based on non adaptive immune algorithm (NAIA) in power systems. …”
    Get full text
    Get full text
    Article
  15. 15

    Developing A Control Protocol Algorithm For Stimulating The Street Light System by Wong, Kwo Yiang

    Published 2017
    “…The final prototype is developed by using the control protocol algorithm to activate the system and control all the street lights simultaneously based on the presence of objects. …”
    Get full text
    Get full text
    Monograph
  16. 16

    Integration of dual intelligent algorithms in shunt active power filter by Abdul Rahman, Nor Farahaida, Mohd Radzi, Mohd Amran, Mariun, Norman, Che Soh, Azura, Abd Rahim, Nasrudin

    Published 2013
    “…This paper presents an integration of dual intelligent algorithms: artificial neural network (ANN) based fundamental component extraction algorithm and fuzzy logic based DC-link voltage self-charging algorithm (fuzzy self-charging algorithm), in a three-phase three-wire shunt active power filter (SAPF). …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    A self-tuning filter-based adaptive linear neuron approach for operation of three-level inverter-based shunt active power filters under non-ideal source voltage conditions by Yap, Hoon, Mohd Radzi, Mohd Amran, Hassan, Mohd Khair, Mailah, Nashiren Farzilah

    Published 2017
    “…Additionally, the proposed STF-based ADALINE algorithm implements the modified Widrow-Hoff (W-H) weight updating algorithm for fast generation of reference current. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…Therefore, cyberbullying detection using a Machine Learning approach is suggested. This study presents the comparison of three Machine Learning algorithms for the detection using cyberbullying activity on social media platforms specifically Twitter. …”
    Get full text
    Get full text
    Undergraduates Project Papers