Search Results - (( processes validation clustering algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- validation clustering »
- processes validation »
- application testing »
- testing algorithm »
- java application »
-
1
Optimized clustering with modified K-means algorithm
Published 2021“…The proposed algorithm utilised a distance measure to compute the between groups’ separation to accelerate the process of identifying an optimal number of clusters using k-means. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.]
Published 2023“…The process of determining the performance of the cluster is continued based on the internal validity test based on the silhouette index. …”
Get full text
Get full text
Book Section -
3
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
4
A Hybrid K-Means Hierarchical Algorithm for Natural Disaster Mitigation Clustering
Published 2022“…This study also added keyword and disaster-type fields to provide additional information for a better clustering process. The clustering process produced three clusters for the anticipation level of natural disaster mitigation. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Biological-based semi-supervised clustering algorithm to improve gene function prediction
Published 2011“…However, commonclustering algorithms do not provide a comprehensive approach that look into the three categories of annotations; biologicalprocess, molecular function, and cellular component, and were not tested with different functional annotation database formats.Furthermore, the traditional clustering algorithms use random initialization which causes inconsistent cluster generation and areunable to determine the number of clusters involved. …”
Get full text
Get full text
Article -
6
On density-based data streams clustering algorithms: A survey
Published 2017“…Moreover, we investigate the evaluation metrics used in validating cluster quality and measuring algorithms’ performance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Although effective, the performance of the k-means clustering algorithm depends heavily on the initial centroids and the number of clusters, k. …”
Get full text
Get full text
Article -
8
Cluster validity of Xie and Beni and the partition coefficient indexes for fuzzy c-means clustering / Nor Azrin Ahmad Mustaffa
Published 2010“…We use C language to write down the cluster validity indexes.…”
Get full text
Get full text
Thesis -
9
The Parallel Fuzzy C-Median Clustering Algorithm Using Spark for the Big Data
Published 2024“…The experimental results show that c=5, which is consistent for cost function with the ideal silhouette coefficient of 1, is the optimal number of clusters for this dataset. A comparative study is done to validate the proposed algorithm by implementing the other contemporary algorithms for the same dataset. …”
Get full text
Get full text
Get full text
Get full text
Article -
10
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
11
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
12
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Although effective, the performance of the k-means clustering algorithm depends heavily on the initial centroids and the number of clusters, k. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Text spam messages classification using Artificial Immune System (AIS) algorithms
Published 2024thesis::master thesis -
14
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
15
Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach
Published 2022“…In addition, a new image clustering algorithm anticipates the need for largescale serial and parallel processing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Incremental interval type-2 fuzzy clustering of data streams using single pass method
Published 2020“…The results obtained from several fuzzy cluster validity index measures show the enhanced performance of the proposed method over other clustering algorithms. …”
Get full text
Get full text
Article -
17
Prediction of Machine Failure by Using Machine Learning Algorithm
Published 2019“…The columns consist of the variables that record the reading of machine sensor tags. Validation for the model is analyzed by using validation testing data and cross validation. …”
Get full text
Get full text
Final Year Project -
18
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…In recent years soft computing methods like fuzzy logic and genetic algorithm are being used in modeling complex processes of hydrologic events. …”
Get full text
Get full text
Thesis -
19
Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi
Published 2019“…Based on the above components and circumstances, many studies have been performed on data clustering problems. Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
Get full text
Get full text
Thesis -
20
A keypoint based copy-move forgery detection and localization in digital images / Somayeh Sadeghi
Published 2015“…Several experiments are performed to validate the effectiveness and robustness of the proposed algorithm against different attacks, such as pre-processing attacks. …”
Get full text
Get full text
Thesis
