Search Results - (( java implication based algorithm ) OR ( software solution clustering algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8

    Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong by Chong, Chun Yong

    Published 2016
    “…However, software clustering is typically conducted in an unsupervised and rigid manner, where maintainers have no influence on the clustering results and only a single solution is produced for any given dataset. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In conventional hard clustering approach, the number of clusters was determined by hierarchical clustering and two-step cluster analysis; then the sites were allocated to the appropriate cluster by k-means clustering method. …”
    Get full text
    Get full text
    Thesis
  14. 14

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Recognition software achieved 87.14%, EPD algorithm achieved 73.57% and HMT algorithm achieved 74.30%) prediction accuracy with OTs. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…The proposed protocol arranges the nodes in clusters and creates an authentication blockchain for each cluster. …”
    Get full text
    Get full text
    Article
  20. 20