Search Results - (( simulation classification clustering algorithm ) OR ( java implementation from algorithm ))
Search alternatives:
- simulation classification »
- classification clustering »
- java implementation »
- implementation from »
- from algorithm »
-
1
An Analysis Of Various Algorithms For Text Spam Classification And Clustering Using Rapidminer And Weka
Published 2024“…By using the same dataset, which is downloaded from UCI, Machine Learning Repository, various algorithms used in classification and clustering in this simulation has been analysed comparatively. …”
Article -
2
Improving Classification of Remotely Sensed Data Using Best Band Selection Index and Cluster Labelling Algorithms
Published 2005“…The advantage of the cluster labelling algorithm compared to co-spectral plot and maximum-likelihood classifier was the algorithm provided a rapid production of high accuracy classification map.…”
Get full text
Get full text
Thesis -
3
Electricity load profile determination by using fuzzy C-means and probability neural network / Norhasnelly Anuar
Published 2015“…The objectives of this project are to use FCM as the clustering algorithm to establish TLPs. The optimal number of cluster for FCM is obtained through cluster validity analysis. …”
Get full text
Get full text
Thesis -
4
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
5
-
6
Feature extraction and classification :a case study of classifying a simulated digital mammogram images using self-organizing maps (som)
Published 2007“…The accuracy of classification performance was acquired. A case study of breast cancer has been demonstrated in this study by using a simulated digital mammogram images. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
7
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Neuro fuzzy classification and detection technique for bioinformatics problems
Published 2007Get full text
Get full text
Get full text
Book Section -
11
Case study : an effect of noise in character recognition system using neural network
Published 2003“…These problems may be characterized as mapping(including pattern association and pattern classification), clustering and constrained optimization. …”
Get full text
Get full text
Thesis -
12
Optimalisation of a job scheduler in the grid environment by using fuzzy C-mean
Published 2007“…This paper presents the need for such a prediction and optimization engine that discusses the approach for history-based prediction and optimization. Simulation runs demonstrate that our algorithm leads to better results than the traditional algorithms for scheduling policies used in Grid environment.…”
Get full text
Article -
13
Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter
Published 2019“…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
Get full text
Get full text
Thesis -
14
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
Get full text
Get full text
Thesis -
15
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…Using the J48 tree algorithm implemented through WEKA API on a Java Servlet, data provided is processed to derive a health index of the plant, with the possible outcomes set to “Good,” “Okay”, or “Bad”. …”
Get full text
Get full text
Get full text
Article -
16
Route Optimization System
Published 2005“…Using that process, we have settled on Java as our development platform as we found it able to both implement DA and the GIS component (map display and manipulation). …”
Get full text
Get full text
Final Year Project -
17
A coverage path planning approach for autonomous radiation mapping with a mobile robot
Published 2023Article -
18
A Naïve-Bayes classifier for damage detection in engineering materials
Published 2007“…The method is based on mean and maximum values of the amplitudes of waves after dividing them into folds then grouping them by a clustering algorithm (e.g. k-means algorithm). The Naïve-Bayes classifier and the feature sub-set selection method were analyzed and tested on two sets of data. …”
Get full text
Get full text
Get full text
Article -
19
Reassembly and clustering bifragmented intertwined jpeg images using genetic algorithm and extreme learning machine
Published 2019“…The RX_myKarve is an extended framework from X_myKarve, which consists of the following key components: (i) an Extreme Learning Machine (ELM) neural network for clusters classification using three existing content-based features extraction (Entropy, Byte Frequency Distribution (BFD) and Rate of Change (RoC)) to improve the identification of JPEG images content and support the reassembling process; (ii) a genetic algorithm with Coherence Euclidean Distance (CED) matric and cost function to reconstruct a JPEG image from a set of deformed and fragmented clusters in the scan area. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Isolated digit speech recognition in Malay language using Neuro-Fuzzy approach
Published 2009Get full text
Get full text
Conference or Workshop Item
