Search Results - (( parameter identification clustering algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- identification clustering »
- parameter identification »
- normalization algorithm »
- data normalization »
- java »
-
1
-
2
Modeling of vehicle trajectory using K-means and fuzzy C-means clustering
Published 2019“…As these clustering algorithms require the number of clusters as input parameter of the algorithms, the study of number of clusters for the clustering is served as focus in this paper. …”
Get full text
Get full text
Get full text
Get full text
Proceedings -
3
A modified π rough k-means algorithm for web page recommendation system
Published 2018“…The experimental results revealed that the modified πRKM algorithm performed better than the previous version in terms of the correct identification of overlapping objects between positive clusters. …”
Get full text
Get full text
Get full text
Thesis -
4
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
5
RECURSIVE LEARNING ALGORITHMS ON RBF NETWORKS FOR NONLINEAR SYSTEM IDENTIFICATION
Published 2010“…This thesis proposes derivative free learning, using finite difference, methods for fixed size RBF network in comparison to gradient based learning for the application of system identification. The thesis also try to investigate the influence of initialization of RBF weights parameters on the overall learning performance using random method and advanced unsupervised learning, such as clustering techniques, as a comparison. …”
Get full text
Get full text
Get full text
Thesis -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
7
Detection And Identification Of Stiction In Control Valves Based On Fuzzy Clustering Method
Published 2016“…This modification prevents the fuzzy clustering algorithm from turning into numerical problem. …”
Get full text
Get full text
Thesis -
8
Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei
Published 2021“…By integrating ISMA, both supervised and unsupervised machine learning algorithms were investigated to develop real-time damage identification schemes. …”
Get full text
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
10
Species distribution and molecular variations in drogonflies (order: odonata) within the state of Selangor, Malaysia / Noorhidayah Binti Mamat
Published 2013“…Opposite to suborder Zygoptera, they were resolved clustered into 2 clusters, paraphyletic group. The distinct separation between cluster Anisoptera and Zygoptera with confidence level 72% in the NJ analyses while 90% in MP analyses. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Fault Detection Relevant Modeling of an Industrial Gas Turbine based on Neuro-Fuzzy Approach
Published 2010“…Structure and network weights for the NF model are determined by a synergetic approach – Data clustering and Gradient Descent algorithm. Operation data collected in 10 seconds interval and for one day is used for model training and validation. …”
Get full text
Conference or Workshop Item -
12
-
13
Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh
Published 2020“…The training and parameters selection of the machine learning algorithms are conducted using EEG data collected from ten subjects in the laboratory. …”
Get full text
Get full text
Get full text
Thesis -
14
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
15
Detection of sweetness level for fruits (watermelon) with machine learning
Published 2020“…The objective of this work is to investigate the sweetness parameter for the fruit’s detection and classification algorithm in machine learnings. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz
Published 2014“…The competency of VSCI was corroborated in three tasks; weak bus identification, automatic line outage contingency ranking and weak area identification. …”
Get full text
Get full text
Thesis -
17
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis
