Search Results - (( using estimation clustering algorithm ) OR ( java _ implementation algorithm ))

Refine Results
  1. 1

    Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms by Bundak, Caceja Elyca

    Published 2021
    “…Therefore, for the second objective, another algorithm named the fuzzy algorithm is designed which combines the clustering algorithm, matching algorithm, triangle area algorithm and average Euclidean algorithm used to estimate location. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms by Alswaitti, Mohammed Y. T.

    Published 2018
    “…Moreover, the balance between the exploration and exploitation processes in the DPSO framework is considered using a combination of (i) a kernel density estimation technique associated with new bandwidth estimation method and (ii) estimated multi-dimensional gravitational learning coefficients. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm by Dalatu, Paul Inuwa

    Published 2018
    “…The K-Means algorithm is the commonest and fast technique in partitional cluster algorithms, although with unnormalized datasets it can achieve local optimal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Harmony Search-Based Fuzzy Clustering Algorithms For Image Segmentation by Alia, Osama Moh’d Radi

    Published 2011
    “…Second, a new dynamic HS-based fuzzy clustering algorithm (DCHS) is proposed to automatically estimate the appropriate number of clusters as well as a good fuzzy partitioning of the given dataset. …”
    Get full text
    Get full text
    Thesis
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Parameter Estimation of Lorenz Attractor: A Combined Deep Neural Network and K-Means Clustering Approach by Nurnajmin Qasrina Ann, ., Pebrianti, Dwi, Mohamad Fadhil, Abas, Bayuaji, Luhur

    Published 2022
    “…The most popular method to solve parameter estimation problem is using optimization algorithm that easily trap to local minima and poor in exploitation to find the good solutions. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Datasets Size: Effect on Clustering Results by Raheem, Ajiboye Adeleke, Ruzaini, Abdullah Arshah, Hongwu, Qin

    Published 2013
    “…In this paper, we proposed a research technique that implements descriptive algorithms on numeric datasets of varied sizes. We modeled each subset of our data using EM clustering algorithm; two different numbers of partitions (k) were estimated and used for each experiment. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption by Nurnajmin Qasrina Ann, Ayop Azmi

    Published 2023
    “…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Segmentation of MRI brain images using statistical approaches by Balafar, Mohammad Ali

    Published 2011
    “…The Gaussian Mixture Model (GMM) is a clustering algorithm that is commonly used for brain MRI segmentation. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor by Adilah, Abdul Ghapor

    Published 2017
    “…As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Semiparametric binary model for clustered survival data by Arlin, Rifina, Ibrahim, Noor Akma, Arasan, Jayanthi, Abu Bakar, Mohd Rizam

    Published 2014
    “…A backfitting algorithm is used in the derivation of the estimating equation for the parametric and nonparametric components of a semiparametric binary covariate model. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering by Umelo, Nnamdi Henry, Noordin, Nor Kamariah, A. Rasid, Mohd Fadlee, Tan, Kim Geok, Hashim, Fazirulhisyam

    Published 2023
    “…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
    Get full text
    Get full text
    Article
  14. 14

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  15. 15

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  16. 16

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  17. 17

    An investigation of structural breaks on spot and futures crude palm oil returns by Zainudin, Rozaimah, Shaharudin, Roselee Shah

    Published 2011
    “…Using the Inclan and Tioa Iterated Cumulative Sums of Squares (ICSS) algorithm procedures, we proceed to identify any structural changes in series variance. …”
    Get full text
    Get full text
    Article
  18. 18

    Expectation maximization clustering algorithm for user modeling in web usage mining system by Mustapha, Norwati, Jalali, Manijeh, Jalali, Mehrdad

    Published 2009
    “…The model is based on expectation-maximization (EM) algorithm and it is used for finding maximum likelihood estimates of parameters in probabilistic models, where the model depends on unobserved latent variables. …”
    Get full text
    Get full text
    Article
  19. 19

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis