Search Results - (( java application testing algorithm ) OR ( pattern detection clustering algorithm ))
Search alternatives:
- detection clustering »
- application testing »
- testing algorithm »
- pattern detection »
- java application »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…There are many algorithm for analysing clustering each having its own method to do clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Image segmentation using an adaptive clustering technique for the detection of acute leukemia blood cells images
Published 2024Conference Paper -
3
RFID-enabled supply chain detection using clustering algorithms
Published 2015“…We will apply various clustering algorithms to analyzed and determine every attribute in the dataset structure pattern. …”
Get full text
Get full text
Conference or Workshop Item -
4
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…Result shows that, the algorithm can successfully identify 135 unique tasks of different lengths.This algorithm is surely being an alternate way of pattern recognition in intelligent home.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Detection of tube defect using the autoregressive algorithm
Published 2015“…This study is aimed to automate defect detection using the pattern recognition approach based on the classification of high frequency stress wave signals. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…The pattern of the features such as intensity and pitch are observed and clustered to find out how many patterns can be identified from all the words. …”
Get full text
Get full text
Thesis -
7
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…The signals were then clustered using the feature extraction algorithms. …”
Get full text
Get full text
Get full text
Article -
8
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
Get full text
Get full text
Get full text
Article -
9
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Clustering is one of the promising techniques used in Anomaly Intrusion Detection (AID), especially when dealing with unknown patterns. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Image Segmentation Using an Adaptive Clustering Technique for the Detection of Acute Leukemia Blood Cells Images
Published 2024Proceedings Paper -
12
Application of kohonen neural network and rough approximation for overlapping clusters optimization
Published 2008“…Experiments show that the proposed two-level algorithm is more accurate and generates fewer errors as compared with crisp clustering operations.…”
Get full text
Get full text
Article -
13
A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications
Published 2022“…Without human input, these algorithms discover patterns or groupings in the data. …”
Get full text
Get full text
Article -
14
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
15
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
16
Identifying multiple outliers in linear functional relationship model using a robust clustering method
Published 2023“…Outliers are some observation points outside the usual pattern of the other observations. It is essential to detect outliers as anomalous observations can affect the inference made in the analysis. …”
Get full text
Get full text
Get full text
Article -
17
Low area Programmable Memory Built-In Self-Test (PMBIST) for small embedded ram cores / Nur Qamarina Mohd Noor
Published 2013“…The first experiment is performed by clustering test patterns of RAMs under test. The second experiment deeply encodes the clusters of test patterns to improve the cluster technique to allow multiple test data types. …”
Get full text
Get full text
Thesis -
18
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Size was extracted using Extreme Point Detection algorithm and Hit or Miss Transformation method was used to extract the stroke formation pattern. …”
Get full text
Get full text
Thesis -
19
A Distributed Event Detection Scheme for Wireless Sensor Networks
Published 2009“…Many of the existing event detection schemes in wireless sensor networks that employ classification or clustering approaches suffer from high communication and computational overheads. …”
Get full text
Get full text
Conference or Workshop Item -
20
Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means
Published 2005“…We are using a Rough Sets to select a subset of input features for clustering with a goal of increasing the detection rate and decreasing the false alarm rate in network intrusion detection. …”
Get full text
Get full text
Get full text
Article
