Search Results - (( java application customization algorithm ) OR ( based observational data algorithm ))
Search alternatives:
- customization algorithm »
- observational data »
- java application »
- data algorithm »
-
1
Knowledge-based genetic algorithm for multidimensional data clustering
Published 2014“…In this paper, a new approach of genetic algorithm called knowledge-based Genetic Algorithm (KBGA-Clustering) is proposed for multidimensional data clustering. …”
Get full text
Get full text
Get full text
Get full text
Article -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
Knowledge-based genetic algorithm for multidimensional data clustering
Published 2013“…In this paper, a new approach of genetic algorithm called knowledge-based Genetic Algorithm (KBGA-Clustering) is proposed for multidimensional data clustering. …”
Get full text
Get full text
Get full text
Proceeding Paper -
4
The effect of different similarity distance measures in detecting outliers using single-linkage clustering algorithm for univariate circular biological data
“…It is found that a clustering-based procedure using a single-linkage algorithm with various similarity distances is a practical and promising approach to detect outliers in univariate circular data, particularly for biological data. …”
Get full text
Get full text
Get full text
Article -
5
A study of fluctuations in genetic algorithm optimized network in data centre
Published 2017“…The purpose of this study is to observe the reliability of genetic algorithm in our previously simulated network optimization in a data centre. …”
Get full text
Get full text
Article -
6
A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity
Published 2024“…Under this framework, different algorithms have been developed where the output relies on an exact distance calculated based on the objects’ features. …”
Get full text
Get full text
Article -
7
Improvement on agglomerative hierarchical clustering algorithm based on tree data structure with bidirectional approach
Published 2024Conference Paper -
8
Particle filter approach for tracking indoor user location using IEEE 802.11 signals
Published 2011“…The paper discussed the comparison between the true location and the estimated location based on two types of signals data: normal data and noise data. …”
Get full text
Get full text
Get full text
Article -
9
An improved pheromone-based kohonen self-organising map in clustering and visualising balanced and imbalanced datasets
Published 2021“…However, similar to other clustering algorithms, this algorithm requires sufficient data for its unsupervised learning process. …”
Get full text
Get full text
Get full text
Article -
10
The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms
Published 2024“…This study proposes the procedure of detecting multiple outliers, particularly for univariate circular data based on agglomerative clustering algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan
Published 2022“…It was also observed that the proposed routing algorithm outperforms the LEACH in network lifetime with 1697 rounds as compared to the original LEACH of with just 803 rounds. …”
Get full text
Get full text
Thesis -
12
Power Stabilization Of A Stand-Alone Solar System Using Perturb and Observe MPPT Algorithm
Published 2010“…This paper presents the method of power stabilization of a stand-alone solar system using perturb and observe (P&O) maximum power point algorithm. The PV module is modeled based on the parameters obtained from a commercial PV data sheet. …”
Get full text
Get full text
Conference or Workshop Item -
13
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…It is noted that active user intervention increases the acceleration of Genetic Algorithm towards an optimal solution. In proposed research work, the user is aided by a visualization based on the representation of multidimensional Genetic Algorithm data on 2-0 space. …”
Get full text
Get full text
Thesis -
14
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…A deterministic mutation-based algorithm is introduced to overcome this problem. …”
Get full text
Get full text
Get full text
Article -
15
Particle filter approach for estimating indoor mobile user location using IEEE 802.11 signals (F1090)
Published 2011“…The paper discussed the comparison between the true location and the estimated location based on two types of signals data: normal data and noise data. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Misuse detection algorithms model know attack behavior. They compare sensor data to attack patterns learned from the training data. …”
Get full text
Get full text
Thesis -
17
Performance evaluation of different data aggregation algorithms for different types of sensors in WSN based cluster
Published 2018“…In wireless sensor networks, data aggregation algorithms are used to extend the network lifetime Size of data transmission from the cluster head node to base station show a critical role in CH nodes energy consumption. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…Furthermore, the proposed techniques based on the QLearning algorithm do not consider context-based actions. …”
Get full text
Get full text
Get full text
Thesis -
19
Modified least trimmed squares method for face recognition / Nur Azimah Abdul Rahim
Published 2018“…In the proposed algorithm, the contaminated observations are distinguished in C-steps as every observation will be assigned a weight based on a cutoff value which will give a zero weight for any observations with residual error greater than the cutoff value and a weight "one" (1) otherwise. …”
Get full text
Get full text
Thesis -
20
Implementation of machine learning algorithm in preventing network congestion
Published 2023text::Final Year Project
