Search Results - (( java implementation modified algorithm ) OR ( parameter application clustering algorithm ))
Search alternatives:
- implementation modified »
- application clustering »
- parameter application »
- java implementation »
-
1
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
2
OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT
Published 2023“…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. The objectives of this work are: i) to provide a comprehensive review of the cloud and scheduling process; ii) to classify the scheduling strategies and scientific workflows; iii) to implement our proposed algorithm with various scheduling algorithms (i.e., Min-Min, Round-Robin, Max-Min, and Modified Max-Min) for performance comparison, within different cloudlet sizes (i.e., small, medium, large, and heavy) in three scientific workflows (i.e., Montage, Epigenomics, and SIPHT); and iv) to investigate the performance of the implemented algorithms by using CloudSim. …”
Review -
3
-
4
An improved ACS algorithm for data clustering
Published 2020Get full text
Get full text
Get full text
Article -
5
Aco-based feature selection algorithm for classification
Published 2022“…However, the MGCACO algorithm has three main drawbacks in producing a features subset because of its clustering method, parameter sensitivity, and the final subset determination. …”
Get full text
Get full text
Thesis -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The proposed protocol is designed with lightweight cryptographic algorithm, including XOR, Hamming distance, rotation and a modified linear congruential generator (MLCG). …”
Get full text
Get full text
Thesis -
7
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
8
Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din
Published 2016“…However, there is still a lack of effective techniques to determine and select the cluster head. Currently, the selection of cluster head is based on residual energy and several parameters. …”
Get full text
Get full text
Thesis -
9
Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours
Published 2024thesis::doctoral thesis -
10
-
11
Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din
Published 2017“…However, there is still a lack of effective techniques to determine and select the cluster head. Currently, the selection of cluster head is based on residual energy and several parameters. …”
Get full text
Get full text
Book Section -
12
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
13
-
14
Development of an intelligent prediction tool for rice yield based on machine learning techniques
Published 2006“…Whereas kernel-based clustering algorithm is developed for finding clusters in climate data. …”
Get full text
Get full text
Article -
15
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…This paper is a comparative study of several algorithms for detecting multiple outliers in circular-circular regression model based on the clustering algorithms. …”
Get full text
Get full text
Get full text
Article -
16
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…It can be extended to support generating CSP for contents that are modified by JavaScript after loading. Current approach inspects the static contents of URLs.…”
Get full text
Get full text
Conference or Workshop Item -
17
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In conventional hard clustering approach, the number of clusters was determined by hierarchical clustering and two-step cluster analysis; then the sites were allocated to the appropriate cluster by k-means clustering method. …”
Get full text
Get full text
Thesis -
18
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis -
19
-
20
Modeling and Analysis of New Hybrid Clustering Technique for Vehicular Ad Hoc Network
Published 2023“…The effectiveness of the clustering model is the most important challenge. The K-Means clustering algorithm is an effective algorithm for multi-clusters that can be used in VANETs. …”
Article
