Search Results - (( simulation classification clustering algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- simulation classification »
- classification clustering »
- application testing »
- testing algorithm »
- java application »
-
1
An Analysis Of Various Algorithms For Text Spam Classification And Clustering Using Rapidminer And Weka
Published 2024“…By using the same dataset, which is downloaded from UCI, Machine Learning Repository, various algorithms used in classification and clustering in this simulation has been analysed comparatively. …”
Article -
2
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…The advantage of the cluster labelling algorithm compared to co-spectral plot and maximum-likelihood classifier was the algorithm provided a rapid production of high accuracy classification map.…”
Get full text
Get full text
Thesis -
3
Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar
Published 2015“…The objectives of this project are to use FCM as the clustering algorithm to establish TLPs. The optimal number of cluster for FCM is obtained through cluster validity analysis. …”
Get full text
Get full text
Thesis -
4
Feature extraction and classification :a case study of classifying a simulated digital mammogram images using self-organizing maps (som)
Published 2007“…The accuracy of classification performance was acquired. A case study of breast cancer has been demonstrated in this study by using a simulated digital mammogram images. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
5
-
6
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Neuro fuzzy classification and detection technique for bioinformatics problems
Published 2007Get full text
Get full text
Get full text
Book Section -
8
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
9
Case study : an effect of noise in character recognition system using neural network
Published 2003“…These problems may be characterized as mapping(including pattern association and pattern classification), clustering and constrained optimization. …”
Get full text
Get full text
Thesis -
10
Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean
Published 2007“…This paper presents the need for such a prediction and optimization engine that discusses the approach for history-based prediction and optimization. Simulation runs demonstrate that our algorithm leads to better results than the traditional algorithms for scheduling policies used in Grid environment.…”
Get full text
Article -
11
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
12
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
Get full text
Get full text
Thesis -
13
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article -
14
A Naïve-Bayes classifier for damage detection in engineering materials
Published 2007“…The method is based on mean and maximum values of the amplitudes of waves after dividing them into folds then grouping them by a clustering algorithm (e.g. k-means algorithm). The Naïve-Bayes classifier and the feature sub-set selection method were analyzed and tested on two sets of data. …”
Get full text
Get full text
Get full text
Article -
15
Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine
Published 2019“…The RX_myKarve is an extended framework from X_myKarve, which consists of the following key components: (i) an Extreme Learning Machine (ELM) neural network for clusters classification using three existing content-based features extraction (Entropy, Byte Frequency Distribution (BFD) and Rate of Change (RoC)) to improve the identification of JPEG images content and support the reassembling process; (ii) a genetic algorithm with Coherence Euclidean Distance (CED) matric and cost function to reconstruct a JPEG image from a set of deformed and fragmented clusters in the scan area. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Isolated digit speech recognition in Malay language using Neuro-Fuzzy approach
Published 2009Get full text
Get full text
Conference or Workshop Item -
17
-
18
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
19
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
20
