Search Results - (( java implementation level algorithm ) OR ( using computing clustering algorithm ))
Search alternatives:
- implementation level »
- computing clustering »
- java implementation »
- level algorithm »
- using computing »
-
1
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…The encryption algorithms are playing an important part in the protection level for data. …”
Get full text
Get full text
Thesis -
2
Parallel genetic algorithms for shortest path routing in high- performance computing / Mohd Erman Safawie Che Ibrahim
Published 2012“…The objectives of this project to set-up Beowulf cluster computer to apply the Travelling Salesman Problem in parallel by using Genetic Algorithms and evaluate sequential algorithms and parallel algorithms by Genetic Algorithms. …”
Get full text
Get full text
Thesis -
3
Towards lowering computational power in IoT systems: Clustering algorithm for high-dimensional data stream using entropy window reduction
Published 2024“…The findings of the experiments are compared to the outcomes of BOCEDS, CEDAS, and MuDi-Stream algorithms. The outcomes indicate that the EWR algorithm outperformed the baseline clustering algorithms. …”
Article -
4
-
5
MuDi-Stream: A multi density clustering algorithm for evolving data stream
Published 2016Get full text
Get full text
Article -
6
Autonomous and deterministic supervised fuzzy clustering
Published 2010“…The results obtained show that the model that uses the global k-means clustering algorithm 1 has higher accuracy when compared to a model that uses the k-means clustering algorithm. …”
Get full text
Get full text
Article -
7
An adaptive density-based method for clustering evolving data streams / Amineh Amini
Published 2014“…However, existing density-based data stream clustering algorithms are not without problems. The first problem refers to the high computation time required for the clustering process. …”
Get full text
Get full text
Get full text
Thesis -
8
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
9
An improved ACS algorithm for data clustering
Published 2020Get full text
Get full text
Get full text
Article -
10
Biological-based semi-supervised clustering algorithm to improve gene function prediction
Published 2011“…However, commonclustering algorithms do not provide a comprehensive approach that look into the three categories of annotations; biologicalprocess, molecular function, and cellular component, and were not tested with different functional annotation database formats.Furthermore, the traditional clustering algorithms use random initialization which causes inconsistent cluster generation and areunable to determine the number of clusters involved. …”
Get full text
Get full text
Article -
11
Computational Discovery of Motifs Using Hierarchical Clustering Techniques
Published 2008Get full text
Get full text
Get full text
Proceeding -
12
-
13
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
14
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…These algorithms mostly built upon the partitioning k-means clustering algorithm. …”
Get full text
Get full text
Thesis -
15
Document clustering based on firefly algorithm
Published 2015Get full text
Get full text
Get full text
Article -
16
Fast and Accuracy Control Chart Pattern Recognition using a New cluster-k-Nearest Neighbor
Published 2009Get full text
Get full text
Citation Index Journal -
17
Fast and Accuracy Control Chart Pattern Recognition using a New cluster-k-Nearest Neighbor
Published 2008Get full text
Get full text
Citation Index Journal -
18
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Discovering optimal clusters using firefly algorithm
Published 2016Get full text
Get full text
Article -
20
Extensions to the K-AMH algorithm for numerical clustering
Published 2018Get full text
Get full text
Get full text
Article
