Search Results - (( structured solution clustering algorithm ) OR ( java application learning algorithm ))

Refine Results
  1. 1

    Integrated bisect K-means and firefly algorithm for hierarchical text clustering by Mohammed, Athraa Jasim, Yusof, Yuhanis, Husni, Husniza

    Published 2016
    “…However, the Bisect K-means which is a well-known hierarchical clustering algorithm is only able to generate local optimal solutions due to the employment of K-means as part of its process. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Spatial Clustering Algorithm for Time Series Rainfall Data Using X-Means Data Splitting by Ali, Noor Rasidah, Ku Mahamud, Ku Ruhana

    Published 2017
    “…The performance of the clustering algorithm gets even worse if it relies on actual data and many clustering algorithms are often faced with conflict in handling high dimensional data. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Modified ACS centroid memory for data clustering by Jabbar, Ayad Mohammed, Ku-Mahamud, Ku Ruhana, Sagban, Rafid

    Published 2019
    “…ACOC cannot transfer the current clustering solution to the next iterations due to the history of the search being lost during the algorithm run. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    An enhanced cluster head selection algorithm for routing in mobile AD-HOC network by Abdulsaheb, Ghaida Muttasher

    Published 2017
    “…This thesis proposes a cluster based routing protocol, the Enhanced Cluster Routing Protocol (ECRP), which uses a modified cluster formation algorithm to build the cluster structure and select one of the nodes to be the cluster head. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An improved energy-efficient clustering protocol to prolong the wireless sensor network lifetime by Alhmood, Ali Abdul-Hussian Hassan

    Published 2021
    “…However, existing clustering protocols suffer from issues concerning the clustering structure that adversely affects the performance of these protocols. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    Blockchain based security framework for device authentication and data communication in decentralized IoT network by Alahmed, Mahmoud Tayseer

    Published 2023
    “…The devices are arranged in a hierarchical structure of blockchains according to the clusters. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Quantification and segmentation of breast cancer diagnosis: efficient hardware accelerator approach by Othman, Khairulnizam

    Published 2022
    “…Segmentation clustering algorithms have setbacks on overlapping clusters, proportion, and multidimensional scaling to map and leverage the data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong by Chong, Chun Yong

    Published 2016
    “…Even if maintainers possess additional information that could be useful to guide and improve the clustering results, traditional clustering algorithms have no way to take advantage of this information. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Data stream clustering by divide and conquer approach based on vector model by Khalilian, Madjid, Mustapha, Norwati, Sulaiman, Nasir

    Published 2016
    “…The continuous effort on data stream clustering method has one common goal which is to achieve an accurate clustering algorithm. …”
    Get full text
    Get full text
    Article
  12. 12

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In conventional hard clustering approach, the number of clusters was determined by hierarchical clustering and two-step cluster analysis; then the sites were allocated to the appropriate cluster by k-means clustering method. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Therefore, we propose a prominent approach that integrates each of the NN, a meta-heuristic based on an evolutionary genetic algorithm (GA), and a core online-offline clustering (Core). …”
    Get full text
    Get full text
    Thesis
  15. 15

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…In this paper, we introduce an education tool for learning metaheuristic algorithms that allows displaying the convergence speed of the corresponding metaheuristic upon setting/changing the dependable parameters. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Modifications of K-Means structures were done by inserting genetic algorithm operators and tuning the population. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A numerical method for frequent pattern mining by Mustapha, Norwati, Nadimi-Shahraki, Mohammad-Hossein, Mamat, Ali, Sulaiman, Md. Nasir

    Published 2009
    “…There are two new properties introduced in this method; a novel tree structure called PC_Tree and PC_Miner algorithm. The PC_Tree is a simple tree structure but yet capable to capture the whole of transactions information with an efficient data transformation technique that utilizes the prime number theory. …”
    Get full text
    Get full text
    Article