Search Results - (( pattern detection clustering algorithm ) OR ( java implementation based algorithm ))
Search alternatives:
- detection clustering »
- implementation based »
- java implementation »
- pattern detection »
-
1
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Image segmentation using an adaptive clustering technique for the detection of acute leukemia blood cells images
Published 2024Conference Paper -
4
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
5
RFID-enabled supply chain detection using clustering algorithms
Published 2015“…We will apply various clustering algorithms to analyzed and determine every attribute in the dataset structure pattern. …”
Get full text
Get full text
Conference or Workshop Item -
6
Classification and detection of intelligent house resident activities using multiagent
Published 2013“…Result shows that, the algorithm can successfully identify 135 unique tasks of different lengths.This algorithm is surely being an alternate way of pattern recognition in intelligent home.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Detection of tube defect using the autoregressive algorithm
Published 2015“…This study is aimed to automate defect detection using the pattern recognition approach based on the classification of high frequency stress wave signals. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
Evaluation of intonation features on emphasized Malay words / Syazwani Nasaruddin
Published 2017“…The pattern of the features such as intensity and pitch are observed and clustered to find out how many patterns can be identified from all the words. …”
Get full text
Get full text
Thesis -
9
Pattern Recognition Approach Of Stress Wave Propagation In Carbon Steel Tubes For Defect Detection
Published 2015“…The signals were then clustered using the feature extraction algorithms. …”
Get full text
Get full text
Get full text
Article -
10
Pairwise clusters optimization and cluster most significant feature methods for anomaly-based network intrusion detection system (POC2MSF) / Gervais Hatungimana
Published 2018“…Anomaly-based Intrusion Detection System (IDS) uses known baseline to detect patterns which have deviated from normal behaviour. …”
Get full text
Get full text
Get full text
Article -
11
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…The main challenges of implementing ANPR algorithm on mobile phone are how to produce a higher coding efficiency, lower computational complexity, and higher scalability. …”
Get full text
Get full text
Get full text
Book -
12
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…Clustering is one of the promising techniques used in Anomaly Intrusion Detection (AID), especially when dealing with unknown patterns. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
15
Image Segmentation Using an Adaptive Clustering Technique for the Detection of Acute Leukemia Blood Cells Images
Published 2024Proceedings Paper -
16
Application of kohonen neural network and rough approximation for overlapping clusters optimization
Published 2008“…Experiments show that the proposed two-level algorithm is more accurate and generates fewer errors as compared with crisp clustering operations.…”
Get full text
Get full text
Article -
17
A Review of Unsupervised Machine Learning Frameworks for Anomaly Detection in Industrial Applications
Published 2022“…Without human input, these algorithms discover patterns or groupings in the data. …”
Get full text
Get full text
Article -
18
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
19
Café Web Based System Using Priority Scheduling Approach
Published 2017“…The priority scheduling algorithm is based on Control Processing Unit scheduling algorithm where it has a priority to execute tasks. …”
Get full text
Get full text
Conference or Workshop Item -
20
Identifying multiple outliers in linear functional relationship model using a robust clustering method
Published 2023“…Outliers are some observation points outside the usual pattern of the other observations. It is essential to detect outliers as anomalous observations can affect the inference made in the analysis. …”
Get full text
Get full text
Get full text
Article
