Search Results - (( simulation classification clustering algorithm ) OR ( java application use algorithm ))
Search alternatives:
- simulation classification »
- classification clustering »
- java application »
- application use »
- use algorithm »
-
1
An Analysis Of Various Algorithms For Text Spam Classification And Clustering Using Rapidminer And Weka
Published 2024“…By using the same dataset, which is downloaded from UCI, Machine Learning Repository, various algorithms used in classification and clustering in this simulation has been analysed comparatively. …”
Article -
2
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…The advantage of the cluster labelling algorithm compared to co-spectral plot and maximum-likelihood classifier was the algorithm provided a rapid production of high accuracy classification map.…”
Get full text
Get full text
Thesis -
3
Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar
Published 2015“…The objectives of this project are to use FCM as the clustering algorithm to establish TLPs. The optimal number of cluster for FCM is obtained through cluster validity analysis. …”
Get full text
Get full text
Thesis -
4
Feature extraction and classification :a case study of classifying a simulated digital mammogram images using self-organizing maps (som)
Published 2007“…The accuracy of classification performance was acquired. A case study of breast cancer has been demonstrated in this study by using a simulated digital mammogram images. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
5
-
6
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Neuro fuzzy classification and detection technique for bioinformatics problems
Published 2007Get full text
Get full text
Get full text
Book Section -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
-
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
Case study : an effect of noise in character recognition system using neural network
Published 2003“…These problems may be characterized as mapping(including pattern association and pattern classification), clustering and constrained optimization. …”
Get full text
Get full text
Thesis -
12
Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean
Published 2007“…This paper presents the need for such a prediction and optimization engine that discusses the approach for history-based prediction and optimization. Simulation runs demonstrate that our algorithm leads to better results than the traditional algorithms for scheduling policies used in Grid environment.…”
Get full text
Article -
13
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
Get full text
Get full text
Thesis -
14
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article -
15
A Naïve-Bayes classifier for damage detection in engineering materials
Published 2007“…The method is based on mean and maximum values of the amplitudes of waves after dividing them into folds then grouping them by a clustering algorithm (e.g. k-means algorithm). The Naïve-Bayes classifier and the feature sub-set selection method were analyzed and tested on two sets of data. …”
Get full text
Get full text
Get full text
Article -
16
Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine
Published 2019“…The RX_myKarve is an extended framework from X_myKarve, which consists of the following key components: (i) an Extreme Learning Machine (ELM) neural network for clusters classification using three existing content-based features extraction (Entropy, Byte Frequency Distribution (BFD) and Rate of Change (RoC)) to improve the identification of JPEG images content and support the reassembling process; (ii) a genetic algorithm with Coherence Euclidean Distance (CED) matric and cost function to reconstruct a JPEG image from a set of deformed and fragmented clusters in the scan area. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Isolated digit speech recognition in Malay language using Neuro-Fuzzy approach
Published 2009Get full text
Get full text
Conference or Workshop Item -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
20
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
