Search Results - (( java application modified algorithm ) OR ( software validation clustering algorithm ))
Search alternatives:
- validation clustering »
- application modified »
- software validation »
- java application »
-
1
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…Experiments were conducted using k-means, k-medoids and EM-algorithm. The study implements each algorithm using RapidMiner Software and the results generated was validated for correctness in accordance to the concept of external criteria method. …”
Get full text
Get full text
Get full text
Article -
2
Datasets Size: Effect on Clustering Results
Published 2013Get full text
Get full text
Conference or Workshop Item -
3
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…These practical concerns have led the researcher to propose the idea of integrating domain knowledge into traditional unsupervised clustering algorithms, herewith referred as constrained clustering, a semi-supervised clustering technique where domain experts can explicitly exert their opinions in the form of explicit clustering constraints to restrict whether a pair of software components should or should not be clustered into the same subsystem. …”
Get full text
Get full text
Thesis -
4
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
5
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In conventional hard clustering approach, the number of clusters was determined by hierarchical clustering and two-step cluster analysis; then the sites were allocated to the appropriate cluster by k-means clustering method. …”
Get full text
Get full text
Thesis -
6
-
7
Empirical robustness evaluation of DNA-based clustering methods
Published 2011Get full text
Get full text
Get full text
Article -
8
-
9
-
10
Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz
Published 2014“…Three experiments have been conducted on textual Reuters corpus, Classic and WAP dataset. The clustering results have been validated using the F-measure, Entropy and Purity methods of measurement and compared with two common methods, which are information extraction and textual document clustering, for example, K-means, Frequent Item-Set, Hierarchical Clustering Algorithms and Oracle Text. …”
Get full text
Get full text
Thesis -
11
Visualization of dengue incidences using expectation maximization (EM) algorithm
Published 2017“…R-GIS(R software) and clustering algorithm were used for year 2014 with several weeks to develop the relation between the visualization and prediction of reported incidences. …”
Get full text
Get full text
Article -
12
-
13
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
14
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
15
-
16
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…Overall, the software provides good ability in identifying and classifying various loads of WMH. …”
Get full text
Get full text
Book Section -
17
An automated multimodal white matter hyperintensities identification in MRI brain images using image processing / Iza Sazanita Isa
Published 2018“…Overall, the software provides good ability in identifying and classifying various loads of WMH. …”
Get full text
Get full text
Thesis -
18
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
19
Identification and characterization of copy number variations (CNVs) in dengue patients and its impact with vascular leakage / Zuraihan Zakaria
Published 2016“…Significant genes of interest from both softwares were validated using qPCR. Hundred and thirty-six DNA samples from hospitalized dengue patients in four different hospitals were genotyped. …”
Get full text
Get full text
Thesis -
20
