Search Results - (( java implementation clustering algorithm ) OR ( using computer usage algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  4. 4
  5. 5

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8
  9. 9
  10. 10

    The development of semantic meta-database: an ontology based semantic integration of biological databases by Samsudin, Ruhaidah, Deris, Safaai, Othman, Muhammad Razib, Md. Illias, Rosli

    Published 2007
    “…Therefore, a simple and practical computational method that is more accurate, faster, easy to configure and use, and bears low computing cost is needed particularly for offline usage. …”
    Get full text
    Get full text
    Monograph
  11. 11

    Deadline guarantee for scientific workflow using dynamic scheduling algorithms on IaaS clouds by Alqaisy, Sarah Abdulrahman Shukur

    Published 2018
    “…The flexibility inherent in the elastic Cloud model, while powerful computing results in inefficient usage and high costs when inadequate scheduling and provisioning decisions are made. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…Genetic algorithm was widely used because of its accuracy and simplicity. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15
  16. 16
  17. 17

    Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction by Alkawsi G., Al-amri R., Baashar Y., Ghorashi S., Alabdulkreem E., Kiong Tiong S.

    Published 2024
    “…The results also show low memory usage and computing power in comparison with the baseline algorithms. � 2023 THE AUTHORS…”
    Article
  18. 18

    A federated usage control framework with ontology-based policy and elimination of irrelevant rules set algorithm for grid computing authorization by Maizura, Ibrahim

    Published 2019
    “…This thesis aims at providing solutions to the problem by introducing an authorization framework, namely the Federated Grid Usage Control (FGUC) with a new ontology-based policy model, namely, the UCON based Access Control Ontology (UBACO), and a new grid authorization algorithm, namely, the Elimination of the Irrelevant Authorization Rules Set (EIARS). …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20