Search Results - (( using estimation clustering algorithm ) OR ( java _ implementation algorithm ))
Search alternatives:
- implementation algorithm »
- estimation clustering »
- using estimation »
-
1
Indoor positioning using weighted magnetic field signal distance similarity measure and fuzzy based algorithms
Published 2021“…Therefore, for the second objective, another algorithm named the fuzzy algorithm is designed which combines the clustering algorithm, matching algorithm, triangle area algorithm and average Euclidean algorithm used to estimate location. …”
Get full text
Get full text
Thesis -
2
Fuzzy rank cluster top k Euclidean distance and triangle based algorithm for magnetic field indoor positioning system
Published 2021“…However, the problem of using the KNN algorithm is the fixed K value does not guarantee accurate estimation at every position. …”
Get full text
Get full text
Get full text
Article -
3
Balancing Exploitation And Exploration Search Behavior On Nature-Inspired Clustering Algorithms
Published 2018“…Moreover, the balance between the exploration and exploitation processes in the DPSO framework is considered using a combination of (i) a kernel density estimation technique associated with new bandwidth estimation method and (ii) estimated multi-dimensional gravitational learning coefficients. …”
Get full text
Get full text
Thesis -
4
Statistical data preprocessing methods in distance functions to enhance k-means clustering algorithm
Published 2018“…The K-Means algorithm is the commonest and fast technique in partitional cluster algorithms, although with unnormalized datasets it can achieve local optimal. …”
Get full text
Get full text
Get full text
Thesis -
5
Harmony Search-Based Fuzzy Clustering Algorithms For Image Segmentation
Published 2011“…Second, a new dynamic HS-based fuzzy clustering algorithm (DCHS) is proposed to automatically estimate the appropriate number of clusters as well as a good fuzzy partitioning of the given dataset. …”
Get full text
Get full text
Thesis -
6
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
Parameter Estimation of Lorenz Attractor: A Combined Deep Neural Network and K-Means Clustering Approach
Published 2022“…The most popular method to solve parameter estimation problem is using optimization algorithm that easily trap to local minima and poor in exploitation to find the good solutions. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Datasets Size: Effect on Clustering Results
Published 2013“…In this paper, we proposed a research technique that implements descriptive algorithms on numeric datasets of varied sizes. We modeled each subset of our data using EM clustering algorithm; two different numbers of partitions (k) were estimated and used for each experiment. …”
Get full text
Get full text
Conference or Workshop Item -
9
A new hybrid deep neural networks (DNN) algorithm for Lorenz chaotic system parameter estimation in image encryption
Published 2023“…The first research objective is to develop a new deep learning algorithm by a hybrid of DNN and K-Means Clustering algorithms for estimating the Lorenz chaotic system. …”
Get full text
Get full text
Thesis -
10
Segmentation of MRI brain images using statistical approaches
Published 2011“…The Gaussian Mixture Model (GMM) is a clustering algorithm that is commonly used for brain MRI segmentation. …”
Get full text
Get full text
Thesis -
11
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…As for the multiple outliers, a clustering algorithm is considered and a dendogram to visualise the clustering algorithm is used. …”
Get full text
Get full text
Get full text
Thesis -
12
Semiparametric binary model for clustered survival data
Published 2014“…A backfitting algorithm is used in the derivation of the estimating equation for the parametric and nonparametric components of a semiparametric binary covariate model. …”
Get full text
Get full text
Conference or Workshop Item -
13
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
Get full text
Get full text
Article -
14
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
15
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
16
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
17
An investigation of structural breaks on spot and futures crude palm oil returns
Published 2011“…Using the Inclan and Tioa Iterated Cumulative Sums of Squares (ICSS) algorithm procedures, we proceed to identify any structural changes in series variance. …”
Get full text
Get full text
Article -
18
Expectation maximization clustering algorithm for user modeling in web usage mining system
Published 2009“…The model is based on expectation-maximization (EM) algorithm and it is used for finding maximum likelihood estimates of parameters in probabilistic models, where the model depends on unobserved latent variables. …”
Get full text
Get full text
Article -
19
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Here, we introduce a measure of similarity based on the circular distance and obtain a cluster tree using the single linkage clustering algorithm. …”
Get full text
Get full text
Thesis -
20
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
Get full text
Get full text
Get full text
Thesis
