Search Results - (( solution communicative _ algorithm ) OR ( java implementation clustering algorithm ))
Search alternatives:
- implementation clustering »
- solution communicative »
- java implementation »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
2
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
Get full text
Get full text
Final Year Project -
4
-
5
A web-based implementation of k-means algorithms
Published 2022“…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
-
7
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
10
Improving robot Darwinian particle swarm optimization using quantum-behaved swarm theory for robot exploration and communication / Duaa Mehiar
Published 2021“…In terms of convergence time, the experiment done shows the QRDPSO algorithm is faster to reach an optimal solution than the RDPSO algorithm. …”
Get full text
Get full text
Get full text
Thesis -
11
Performance evaluation of multi-user detection in Cdma using micro-genetic algorithm
Published 2005“…GA works iteratively over a population of solution using crossover and mutation to simulate potential solution. …”
Get full text
Get full text
Get full text
Proceeding Paper -
12
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…We analyse the solution and compare with a range of well-known algorithms in terms of compression ratio, memory usage, the number of instructions, compression speed and energy consumption. …”
Get full text
Get full text
Get full text
Thesis -
13
Performance analysis of clustering based genetic algorithm
Published 2016Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
14
The design and applications of the african buffalo algorithm for general optimization problems
Published 2017“…There have been several scientific investigations in the past several decades on discovering effective and efficient algorithms to providing solutions to the optimization needs of mankind leading to the development of deterministic algorithms that provide exact solutions to optimization problems. …”
Get full text
Get full text
Thesis -
15
Overview of Evolutionary Algorithms and Neural Networks for Modern Mobile Communication
Published 2024journal::journal article -
16
Secured Autonomous Agent-Based Intrusion Detection System (SAAIDS)
Published 2024thesis::master thesis -
17
Design and development of the network interface, packets scheduling and interference mitigation schemes for LTE-based femtocell networks / Sinan Ghassan Abid Ali
Published 2016“…The proposed RBP scheduling algorithm outperforms the well-known scheduling algorithms in terms of a lower PLR among users in the LTE based femtocell network. …”
Get full text
Get full text
Thesis -
18
-
19
Single Fitness Function to Optimize Energy using Genetic Algorithms for Wireless Sensor Network
Published 2024journal::journal article -
20
Securing IEC60870-5-101 Communication Protocol using SCADA Cryptographic and Device Authentication Gateway
Published 2023“…Cryptography; Gateways (computer networks); Communications protocols; Cryptographic algorithms; Cryptographic devices; CryptoGraphics; Device authentications; FPGA technology; Practical solutions; Stuxnet; System security; Authentication…”
Conference Paper
