Search Results - (( using composition clustering algorithm ) OR ( java application force algorithm ))
Search alternatives:
- composition clustering »
- using composition »
- application force »
- java application »
- force algorithm »
-
1
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The classical benchmark problems and composite benchmark functions from Congress on Evolutionary Computation (CEC) 2005 special session is used for validate SDAA. …”
Get full text
Get full text
Get full text
Thesis -
2
-
3
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
4
Dynamic force-directed graph with weighted nodes for scholar network visualization
Published 2022“…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
Get full text
Get full text
Article -
5
On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models
Published 2023“…The estimation procedure follows the standard two-step estimation technique, where the first step adapts the method for the Generalized Additive Models (GAMs) using penalized iteratively reweighted least squares (PIRLS) algorithm, and the second step employs the second-order composite likelihood. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Hybrid of fuzzy clustering neural network over NSL dataset for intrusion detection system
Published 2013“…In recent years, data mining approach for intrusion detection have been advised and used. The approach such as Genetic Algorithms , Support Vector Machines, Neural Networks as well as clustering has resulted in high accuracy and good detection rates but with moderate false alarm on novel attacks. …”
Get full text
Get full text
Get full text
Article -
8
Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider
Published 2011“…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
Get full text
Get full text
Thesis -
9
Quantitative Analysis And Mapping Of Concrete Scanning Electron Microscope (SEM) Images
Published 2018“…By spatial segmentation of K-Means algorithms, the cluster groups generated were carefully reviewed before proceeding to the final analysis. …”
Get full text
Get full text
Monograph -
10
Unsupervised colour segmentation of white blood cell for acute leukaemia images
Published 2011Get full text
Working Paper -
11
Sustainable Location Identification Decision Protocol (SuLIDeP) For Determining The Location Of Recycling Centres In A Circular Economy
Published 2019“…More significantly, this process could be used for clustering and reducing supply chains complexity to enable the setting up of multiple and optimally located recycling centres. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Computational analysis of biological data: Where are we?
Published 2024“…Computer modeling allows such electrical stimulations using statistics, bioinformatics and advanced machine-learning algorithms. …”
Get full text
Get full text
Get full text
Get full text
Book Chapter -
13
Dietary patterns and health outcomes among African American maintenance hemodialysis patients
Published 2020“…Implausible energy intake reports were screened out by comparing reported energy intake (rEI) with predicted total energy expenditure (pTEE). Cluster analysis, using the k-means algorithm, identified two distinct dietary patterns in the study population: a high “sugar sweetened beverage” pattern (hiSSB) and a low “sugar sweetened beverage pattern” (loSSB). …”
Get full text
Get full text
Get full text
Article
