Search Results - (( simulation classification clustering algorithm ) OR ( java application use algorithm ))

Refine Results
  1. 1

    An Analysis Of Various Algorithms For Text Spam Classification And Clustering Using Rapidminer And Weka by Zainal K., Sulaiman N.F., Jali M.Z.

    Published 2024
    “…By using the same dataset, which is downloaded from UCI, Machine Learning Repository, various algorithms used in classification and clustering in this simulation has been analysed comparatively. …”
    Article
  2. 2

    Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms by Teoh, Chin Chuang

    Published 2005
    “…The advantage of the cluster labelling algorithm compared to co-spectral plot and maximum-likelihood classifier was the algorithm provided a rapid production of high accuracy classification map.…”
    Get full text
    Get full text
    Thesis
  3. 3

    Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar by Anuar, Norhasnelly

    Published 2015
    “…The objectives of this project are to use FCM as the clustering algorithm to establish TLPs. The optimal number of cluster for FCM is obtained through cluster validity analysis. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Feature extraction and classification :a case study of classifying a simulated digital mammogram images using self-organizing maps (som) by Lau, Leh Teen.

    Published 2007
    “…The accuracy of classification performance was acquired. A case study of breast cancer has been demonstrated in this study by using a simulated digital mammogram images. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  5. 5
  6. 6

    Data redundancy reduction scheme for data aggregation in wireless sensor network by Adawy, Mohammad Ibrahim

    Published 2020
    “…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10
  11. 11

    Case study : an effect of noise in character recognition system using neural network by Mohamad, Esmawaty

    Published 2003
    “…These problems may be characterized as mapping(including pattern association and pattern classification), clustering and constrained optimization. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean by Lorpunmanee, Siriluck, Abdullah, Abdul Razak

    Published 2007
    “…This paper presents the need for such a prediction and optimization engine that discusses the approach for history-based prediction and optimization. Simulation runs demonstrate that our algorithm leads to better results than the traditional algorithms for scheduling policies used in Grid environment.…”
    Get full text
    Article
  13. 13

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A Naïve-Bayes classifier for damage detection in engineering materials by Addin, O., Salit, Mohd Sapuan, Mahdi Ahmad Saad, Elsadig, Othman, Mohamed

    Published 2007
    “…The method is based on mean and maximum values of the amplitudes of waves after dividing them into folds then grouping them by a clustering algorithm (e.g. k-means algorithm). The Naïve-Bayes classifier and the feature sub-set selection method were analyzed and tested on two sets of data. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine by Raad Ali, Rabei

    Published 2019
    “…The RX_myKarve is an extended framework from X_myKarve, which consists of the following key components: (i) an Extreme Learning Machine (ELM) neural network for clusters classification using three existing content-based features extraction (Entropy, Byte Frequency Distribution (BFD) and Rate of Change (RoC)) to improve the identification of JPEG images content and support the reassembling process; (ii) a genetic algorithm with Coherence Euclidean Distance (CED) matric and cost function to reconstruct a JPEG image from a set of deformed and fragmented clusters in the scan area. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis