Search Results - (( java implementation level algorithm ) OR ( pattern visualization clustering algorithm ))
Search alternatives:
- visualization clustering »
- pattern visualization »
- implementation level »
- java implementation »
- level algorithm »
-
1
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
2
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Classic bag of visual words algorithm is based on k-means clustering and every SIFT features belongs to one cluster and it leads to decreasing classification results. …”
Get full text
Get full text
Get full text
Article -
3
-
4
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
6
-
7
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
8
STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION
Published 2021“…Moreover, skin lesion images are clustered based on fused color, pattern and shape based features. …”
Get full text
Get full text
Get full text
Article -
9
Exploratory study of Kohonen network for human health state classification
Published 2018Get full text
Get full text
Article -
10
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
Get full text
Get full text
Get full text
Thesis -
11
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. The test results show that the Boyer Moore and Knuth Morris Pratt algorithms have an accuracy rate of 100%, and the Horspool algorithm 85.3%. …”
Get full text
Get full text
Journal -
12
An improved RSA cryptosystem based on thread and CRT / Saheed Yakub Kayode and Gbolagade Kazeem Alagbe
Published 2017“…We use a parallel technique that divides RSA power process into seperate threads and employs the use of Chinese Remainder Theorem (CRT) to decrease the time required for both encryption and decryption operation. Java programming language is used to implement the algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
14
Design and Implementation of Data-at-Rest Encryption for Hadoop
Published 2017“…Therefore, the AES encryption algorithm has been implemented in HDFS to ensure the security of data stored in HDFS. …”
Get full text
Get full text
Conference or Workshop Item -
15
Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno
Published 2015“…(c) To study how constructed patterns and trends generate informed decisions on resource allocation for circulation function by using cluster analysis, frequency statistics, averages and aggregates and market basket analysis algorithm. …”
Get full text
Get full text
Thesis -
16
Local-based stereo matching algorithm using multi-cost pyramid fusion, hybrid random aggregation and hierarchical cluster-edge refinement
Published 2023“…The estimation of Stereo Matching Algorithm (SMA) is one of the extensive research topics for obtaining the disparity map from two images. …”
Get full text
Get full text
Get full text
Thesis -
17
Rain streak removal using emboss and spatial-temporal depth filtering technique in video keyframes
Published 2012“…Each drop when falling in high speed will create a streak motion blurred illusion based on the background intensity that reflects the environment creating higher intensity pattern in an image. In this thesis rain streak have been captured and isolated from the background scene by using an embossed filter algorithm designed to highlight the transparent rain streaks that cause the blur and distortion of the video, while the removing algorithm is based on a simple algorithm that correlates spatio-temporal and depth of an image into one technique. …”
Get full text
Get full text
Thesis -
18
Dynamic Mapping and Visualizing Dengue Incidences in Malaysia Using Machine Learning Techniques
Published 2021“…K-mean, KNN, and Expectation-Maximization (EM) algorithms are used to cluster the cases and visualize the pattern of dengue spread. …”
Get full text
Get full text
Article -
19
Development and characterization of anonymous nuclear markers to determine genetic variation in two groupers species and their hybrids
Published 2015“…Among these 13 E. lanceolatus and E. fuscoguttatus ncni-ANM loci ranged in size from 153 to 177 bp and 157 to 624 bp respectively revealing variation across all OTUs through visualization of agarose gel electrophoresis patterns and binary matrix scoring. …”
Get full text
Get full text
Get full text
Thesis -
20
Efficient and effective automated surveillance agents using kernel tricks
Published 2012“…They work by first mapping the raw input data onto a (often much) higher dimensional feature space, and then clustering in the feature space instead. The reasoning is that mapping onto the (higher-dimensional) feature space enables the comparison of additional, higher order correlations in determining patterns between the raw data points. …”
Get full text
Get full text
Get full text
Get full text
Article
