Search Results - (( structures detection clustering algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Detecting space-time disease clusters with arbitrary shapes and sizes using a co-clustering approach by Ullah, S., Daud, H., Dass, S.C., Khan, H.N., Khalil, A.

    Published 2017
    “…To address this problem, a new algorithm is proposed, which uses a co-clustering strategy to detect prospective and retrospective space-time disease clusters with no restriction on shape and size. …”
    Get full text
    Get full text
    Article
  2. 2

    Detection of tube defect using the autoregressive algorithm by Abd Halim, Zakiah, Jamaludin, Nordin, Junaidi, Syarif, Syed Yusainee, Syed Yahya

    Published 2015
    “…Easy detection and evaluation of defect in the tube structure is a continuous problem and remains a significant demand in tube inspection technologies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    RFID-enabled supply chain detection using clustering algorithms by Azahar, T.F., Mahinderjit-Singh, M., Hassan, R.

    Published 2015
    “…We will apply various clustering algorithms to analyzed and determine every attribute in the dataset structure pattern. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Adaptive Neural Subtractive Clustering Fuzzy Inference System for the Detection of High Impedance Fault on Distribution Power System by Tawafan, Adnan, Sulaiman , Marizan, Ibrahim, Zulkifilie

    Published 2012
    “…This paper proposes an intelligent algorithm using an adaptive neural- Takagi Sugeno-Kang (TSK) fuzzy modeling approach based on subtractive clustering to detect high impedance fault. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Framework for stream clustering of trajectories based on temporal micro clustering technique by Abdulrazzaq, Musaab Riyadh

    Published 2018
    “…The temporal micro cluster data structure is proposed in CC_TRS algorithm to store the summarized information for each group of similar segments. …”
    Get full text
    Get full text
    Thesis
  6. 6

    A multi-view clustering algorithm for attributed weighted multi-edge directed networks by Khameneh, Azadeh Zahedi, Kilicman, Adem, Mahad, Zahari

    Published 2022
    “…This type of directed network, whose nodes are described by a list of attributes and directed links are viewed as directed multi-edge, is a new challenge to graph clustering. This paper proposes a new approach to detecting and evaluating clusters of AWMEDiG based on the maximum clique method. …”
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Similarity measure and domain adaptation in multiple mixture model clustering: An application to image processing by Leong, S.H., Ong, S.H.

    Published 2017
    “…The performance of the proposed algorithms are evaluated with simulated data and real images and it is shown to perform much better than existing Gaussian mixture model based algorithms in reproducing images with higher structural similarity index.…”
    Get full text
    Get full text
    Article
  9. 9

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  10. 10

    Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network by Sama, Najm Us

    Published 2019
    “…In the proposed work, the focused problem is how to reduce the communication energy consumption and to avoid the routing hole problem by optimized routing algorithms. First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Therefore, the core classifier in the hyper-heuristic approach of Intrusion Detection System (IDS) is developed to the parallel structure NN. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    A guided hybrid k-means and genetic algorithm models for children handwriting legibility performance assessment / Norzehan Sakamat by Sakamat, Norzehan

    Published 2021
    “…Modifications of K-Means structures were done by inserting genetic algorithm operators and tuning the population. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16

    Data stream clustering by divide and conquer approach based on vector model by Khalilian, Madjid, Mustapha, Norwati, Sulaiman, Nasir

    Published 2016
    “…The continuous effort on data stream clustering method has one common goal which is to achieve an accurate clustering algorithm. …”
    Get full text
    Get full text
    Article
  17. 17

    Application of clustering in managing unstructured textual data in relational database / Wael Mohamed Shaher Yafooz by Yafooz, Wael Mohamed Shaher

    Published 2014
    “…The results show that there are linkages between structured textual data and unstructured information, quality improvement in textual document clustering with accurate clusters and high performance of query processing. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei by Chen , Shilei

    Published 2021
    “…Vibration-based structural damage detection has raised continuous interest over the decades, as a non-destructive way to provide warnings and predict certain faults at early stages. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item