Search Results - (( java implication based algorithm ) OR ( case generation clustering algorithm ))
Search alternatives:
- generation clustering »
- implication based »
- java implication »
- case generation »
-
1
-
2
An online density-based clustering algorithm for data stream based on local optimal radius and cluster pruning
Published 2019“…The clusters are generated from the clustering graphs. …”
Get full text
Get full text
Thesis -
3
Optimized clustering with modified K-means algorithm
Published 2021“…However, the choice of k is a prominent problem in the process of the k-means algorithm. In most cases, for clustering huge data, k is pre-determined by researchers and incorrectly chosen k, could end with wrong interpretation of clusters and increase computational cost. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Hybrid Henry gas solubility optimization algorithm with dynamic cluster-to-algorithm mapping
Published 2021“…Exploiting the dynamic cluster-to-algorithm mapping via penalized and reward model with adaptive switching factor, HHGSO offers a novel approach for meta-heuristic hybridization consisting of Jaya Algorithm, Sooty Tern Optimization Algorithm, Butterfly Optimization Algorithm, and Owl Search Algorithm, respectively. …”
Get full text
Get full text
Get full text
Article -
5
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…In the second part, two user clustering algorithms are proposed. These algorithms are alternatives to the PF-SUS-SIR and can achieve better throughput-fairness trade-off in case of perfect CSIT and limited feedback. …”
Get full text
Get full text
Thesis -
6
Clustering of large time-series datasets using a multi-step approach / Saeed Reza Aghabozorgi Sahaf Yazdi
Published 2013“…It overcomes the limitations of conventional clustering algorithms in dealing with time-series data. …”
Get full text
Get full text
Thesis -
7
Instance matching framework for heterogeneous semantic web content over linked data environment
Published 2021“…The output of each algorithm is evaluated, the results have shown that each algorithm performs well and outperforms the existing algorithms on all test cases in terms better output generation and effective handling of heterogeneity from different domains, which is a necessary concern in all data-intensive problems. …”
Get full text
Get full text
Thesis -
8
Support Vector Machines (SVM) in Test Extraction
Published 2006“…This project's objective is to create a summarizer, or extractor, based on machine learning algorithms, which are namely SVM and K-Means. Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
Get full text
Get full text
Final Year Project -
9
Support Vector Machines (SVM) in Test Extraction
Published 2006“…This project's objective is to create a summarizer, or extractor, based on machine learning algorithms, which are namely SVM and K-Means. Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
Get full text
Get full text
Final Year Project -
10
A Community-Based Fault Isolation Approach for Effective Simultaneous Localization of Faults
Published 2019“…However, the relationship between faults and failures is not easily identified and depends solely on the accuracy of clustering, such as existing clustering algorithms are not able to isolate failed tests to their causative faults effectively which hinder localization effectiveness. …”
Get full text
Get full text
Article -
11
Butterfly Triple System Algorithm Based on Graph Theory
Published 2022“…In combinatorial design theory, clustering elements into a set of three elements is the heart of classifying data, which has recently received considerable attention in the fields of network algorithms, cryptography, design and analysis of algorithms, statistics, and Information theory. …”
Get full text
Get full text
Get full text
Article -
12
An evaluation of Monte Carlo-based hyper-heuristic for interaction testing of industrial embedded software applications.
Published 2020“…The results show that Q-EMCQ is an efficient technique for test case generation. Addition- ally, unlike the t-wise test suite generation, which deals with the minimization problem, we have also subjected Q-EMCQ to a maximization problem involving the general module clustering to demonstrate the effectiveness of our approach. …”
Get full text
Get full text
Get full text
Article -
13
SMALL-SCALE PRIMARY SCHOOL TIMETABLING PROBLEM
Published 2019“…Only one subject from standard one to standard six without any repeated teacher is sorted into a same group, except for the case of combining classes. Period allocation is the second phase of this algorithm. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
14
An evolutionary based features construction methods for data summarization approach
Published 2015“…The DARA algorithm will be applied to summarize data stored in the non-target tables by clustering them into groups, where multiple records stored in nontarget tables correspond to a single record i,tored in a target table. …”
Get full text
Get full text
Research Report -
15
-
16
A Review on Attack Graph Analysis for IoT Vulnerability Assessment: Challenges, Open Issues, and Future Directions
Published 2024“…The survey covers the research conducted between 2016 and 2021(34 peer-reviewed journal articles and 28 conference papers), identifying and categorizing the main methodologies and technologies employed in generating and analyzing attack graphs. In this review, core modeling techniques for IoT vulnerability assessment are highlighted, such as Markov Decision Processes (MDP), Feature Pyramid Networks (FPN), K-means clustering, and logistic regression models, along with other techniques involving genetic algorithms like fast-forward (FF), contingent fast-forwards (CFF), advanced reinforcement-learning algorithms, and HARMs models. …”
Review -
17
Facilitating resource allocation decision through Bibliomining: the case of UTM's library / Md Razib Karno
Published 2015“…(c) To study how constructed patterns and trends generate informed decisions on resource allocation for circulation function by using cluster analysis, frequency statistics, averages and aggregates and market basket analysis algorithm. …”
Get full text
Get full text
Thesis -
18
DC-GAN-based synthetic X-ray images augmentation for increasing the performance of EfficientNet for COVID-19 detection
Published 2021“…To validate whether the generated images are accurate, we used the k‐mean clustering technique with three clusters (Normal, Pneumonia, and COVID‐19). …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
Power management system for smart microgrid considering meteorological and load demand data / Sam Koohikamali
Published 2015“…Microgrid refers to a cluster of generation, load, and energy storage units which can operate in grid-connected and/or in islanded modes. …”
Get full text
Get full text
Thesis -
20
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…The research implements stock prediction analysis as a case study for training the neural network by adopting MGWO algorithm. …”
Get full text
Get full text
Thesis
