Search Results - (( parameter validation clustering algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.] by Pusadan, Mohammad Yazdi, Rabbani, Mohammad Abied, Ardiansyah, Rizka, Ngemba, Hajra Rasmita

    Published 2023
    “…In this study, the method used is K-Means to perform clustering based on area grouping. The implementation of the K-Means Clustering algorithm for detecting the level of spread of COVID-19 data in Indonesia by using the parameter k=3 is quite good with areas in Indonesia that have a high the spread of COVID-19 and the results of the cluster validity test get silhouette values on O = (Total Case, Total Death) and P = (Total Case, Total Death, Total Recovered) have the same cluster value, which is 0.93 which means the cluster quality is very good.…”
    Get full text
    Get full text
    Book Section
  3. 3

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Statistical performance of agglomerative hierarchical clustering technique via pairing of correlation-based distances and linkage methods by Nurshaziana, Mohamad Shamsuri

    Published 2025
    “…The simulation study was conducted under various data conditions; number of variables, sample sizes, percentages of outliers, and data distribution to measure the performance using Cophenetic Correlation Coefficient (CCC). To validate the clustering model on real data, the Spearman-average algorithm was applied to cluster Juru river basin data based on five water quality parameters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In conventional hard clustering approach, the number of clusters was determined by hierarchical clustering and two-step cluster analysis; then the sites were allocated to the appropriate cluster by k-means clustering method. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Automatic Number Plate Recognition on android platform: With some Java code excerpts by ., Abdul Mutholib, Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2016
    “…On the other hand, the traditional algorithm using template matching only obtained 83.65% recognition rate with 0.97 second processing time. …”
    Get full text
    Get full text
    Get full text
    Book
  10. 10
  11. 11

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The research starts with developing the hybrid deep learning model consisting of DNN and a K-Means Clustering Algorithm. Then, the developed algorithm is implemented to estimate the parameters of the Lorenz system. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Machine learning for mapping and forecasting poverty in North Sumatera: a datadriven approach by Marpaung, Faridawaty, Ramadhani, Fanny, Dinata, Dewan

    Published 2024
    “…The best model was created using the grid search cross-validation, while the best prediction results were created using the RF algorithm, with the following parameters: n-estimator = 50, max depth = 10, min samples split = 2, and min samples leaf = 1. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Methodology for modified whale optimization algorithm for solving appliances scheduling problem by Omar, Mohd Faizal, Mohd Bakeri, Noorhadila, Mohd Nawi, Mohd Nasrun, Hairani, Norfazlirda, Khalid, Khalizul

    Published 2020
    “…Whale Optimization Algorithm (WOA) is considered as one of the newest metaheuristic algorithms to be used for solving a type of NP-hard problems. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Automatic Clustering of Students by Level of Situational Interest Based on Their EEG Features by Othman, E.S., Faye, I., Hussaan, A.M.

    Published 2022
    “…The frontal mean delta and alpha power as well as the frontal alpha asymmetry metric served as the input for kâ��means and Densityâ��Based Spatial Clustering of Applications with Noise (DBSCAN) clustering algorithms. …”
    Get full text
    Get full text
    Article
  16. 16

    Café Web Based System Using Priority Scheduling Approach by Fatimah, Ghazali, Rohana, Ismail, Mohamad Hariz, Hasni

    Published 2017
    “…The system is implemented at UniSZA’s café where two different types of user will use the system. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  18. 18
  19. 19

    Development and usage of self-organising maps in high energy physics analysis with high performance computing / Mohd Adli Md Ali by Mohd Adli , Md Ali

    Published 2017
    “…In this research, the effects of several SOM hyperparameters such as the similarity functions, learning rate functions and map size on the clustering outcome was also performed. Moreover, a test case on how the Kullback-Leibler divergence and Multivariate Bhattacharyya Distance equation can be used as a validation parameter for SOM is performed. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of Web services fuzzy quality models using data clustering approach by Hasan, M.H., Jaafar, J., Hassan, M.F.

    Published 2014
    “…The clustering was validated using Xie-Beni index to ensure that it performed optimally. …”
    Get full text
    Get full text
    Article