Search Results - (( java implication based algorithm ) OR ( software solution clustering algorithm ))
Search alternatives:
- implication based »
- software solution »
- java implication »
-
1
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
2
-
3
Knowledge-based genetic algorithm for multidimensional data clustering
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
4
-
5
-
6
-
7
Weight-based firefly algorithm for document clustering
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…However, software clustering is typically conducted in an unsupervised and rigid manner, where maintainers have no influence on the clustering results and only a single solution is produced for any given dataset. …”
Get full text
Get full text
Thesis -
9
-
10
Fuzzy Soft Set Clustering for Categorical Data
Published 2024Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
Minimizing the number of stunting prevalence using the euclid algorithm clustering approach
Published 2023Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In conventional hard clustering approach, the number of clusters was determined by hierarchical clustering and two-step cluster analysis; then the sites were allocated to the appropriate cluster by k-means clustering method. …”
Get full text
Get full text
Thesis -
14
A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat
Published 2021“…Recognition software achieved 87.14%, EPD algorithm achieved 73.57% and HMT algorithm achieved 74.30%) prediction accuracy with OTs. …”
Get full text
Get full text
Thesis -
15
-
16
Blockchain based security framework for device authentication and data communication in decentralized IoT network
Published 2023“…First, this thesis proposes a clustering algorithm for IoT devices based on the device energy residues, the device location relative to other devices in the network, and the device computational ability. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…The proposed protocol arranges the nodes in clusters and creates an authentication blockchain for each cluster. …”
Get full text
Get full text
Article -
20
