Search Results - (( quality classifications clustering algorithm ) OR ( java implementation using algorithm ))

Refine Results
  1. 1

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…The advantage of the cluster labelling algorithm compared to co-spectral plot and maximum-likelihood classifier was the algorithm provided a rapid production of high accuracy classification map.…”
    Get full text
    Get full text
    Thesis
  2. 2

    Aco-based feature selection algorithm for classification by Al-mazini, Hassan Fouad Abbas

    Published 2022
    “…An enhanced graph clustering ant colony optimisation (EGCACO) algorithm is proposed to solve the three (3) MGCACO algorithm problems. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Combining cluster quality index and supervised learning to predict students’ academic performance by Suhaila Zainudin, Rapi’ah Ibrahim, Hafiz Mohd Sarim

    Published 2024
    “…Then, the clusters were evaluated with cluster quality indexes, namely, the Silhouette Coefficient, Calinski-Harabasz Index and Davies-Bouldin Index, to determine the best clusters. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Effective gene selection techniques for classification of gene expression data by Yeo, Lee Chin

    Published 2005
    “…The selected subset of genes is then be used to train the classifiers for constructing rules for future tissue classification problem. Various k-means clustering algorithms and model-based clustering algorithms are proposed to group the genes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Clustering network traffic utilization by Mohd Khairudin, Nazli, Muda, Zaiton, Mustapha, Aida, Nagarathinam, Yogeswaran, Salleh, Mohd. Sidek

    Published 2013
    “…The analysis discussed on the quality of resulting clusters from all the algorithms. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms by Alswaitti, Mohammed Y. T.

    Published 2018
    “…The overall performances of the three proposed frameworks have been compared with several current state-of-the-art clustering algorithms on 15 benchmark datasets from the UCI repository. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A modified weighted support vector machine (WSVM) to reduce noise data in classification problem by Mohd Dzulkifli, Syarizul Amri

    Published 2021
    “…However, data is rarely perfect and there are many inconsistencies that affect data quality such as noise data. Nowadays, the use of SVM is very perspective for the big data classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    A modified weighted support vector machine (WSVM) to reduce noise data in classification problem by Mohd Dzulkifli, Syarizul Amri

    Published 2021
    “…However, data is rarely perfect and there are many inconsistencies that affect data quality such as noise data. Nowadays, the use of SVM is very perspective for the big data classification. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Based on the above components and circumstances, many studies have been performed on data clustering problems. Despite attempts to solve the data clustering issues, there are also many variants of modified algorithms in traditional information clustering that attempt to solve issues such as clustering algorithms based on condensation. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  14. 14

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Development of a parallel clustering of bilingual corpora based on reduced terms by Leow, Ching Leong

    Published 2015
    “…The quality of clustering bilingual text documents is highly influenced by the quality of the bag-of-word presentation of Malay text articles presented to the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Beside that, classic bag of visual words algorithm (BoVW) is based on kmeans clustering and every SIFT feature belongs to one cluster and it leads to decreasing classification results. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
    Get full text
    Get full text
    Conference or Workshop Item