Search Results - (( using mitigation clustering algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- implementation during »
- java implementation »
- using mitigation »
- during algorithm »
-
1
A Hybrid K-Means Hierarchical Algorithm for Natural Disaster Mitigation Clustering
Published 2022“…Therefore, the proposed hybrid algorithm can provide relatively homogeneous clustering results in natural disaster mitigation.…”
Get full text
Get full text
Get full text
Get full text
Article -
2
Data-driven dynamic clustering framework for mitigating the adverse economic impact of Covid-19 lockdown practices
Published 2020“…We then validate the proposed algorithms by conducting extensive simulations using the Malaysian context as a case study. …”
Get full text
Get full text
Get full text
Get full text
Article -
3
Enhancement Of Clustering Algorithm Using 3D Euclidean Distance To Improve Network Connectivity In Wireless Sensor Networks For Correlated Node Behaviours
Published 2024“…Thus, this research proposes enhancement on clustering algorithm to mitigate the impact of correlated node behaviour on network performances. …”
thesis::doctoral thesis -
4
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
5
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…In general, the process of fake news detection was conducted in two different phases, the topic detection phase using a graph-based unsupervised clustering method based on HFPA and Markov Clustering Algorithm (MCL) called (HFPA-MCL) and the fake news detection phase using an unsupervised clustering method based on K-means algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
An efficient up-link load reduction model based on clustering in vanets
Published 2019“…This study proposed an Efficient Up-link Load Reduction (EULR) model to mitigate the uplink load at BSs. EULR model consisted of three parts: the first part, two novel algorithms Smart CH Election (SCHE) and Hybrid Cluster-Head Election (HCHE) to increase cluster stability and reduce the number of CHs changes in the network by selecting the best vehicle as cluster head (CH) based on two dynamic thresholds. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…Therefore, several studies have employed some schemes to reduce data redundancy in the clustered network before data aggregation to mitigate the problems that affects the data aggregation efficiency. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj
Published 2023“…Moreover, two improvised clustering techniques are introduced to reduce the energy overhead cost from the re-clustering process. …”
Get full text
Get full text
Get full text
Thesis -
9
An Effective Power Dispatch Strategy for Clustered Micro-grids while Implementing Optimal Energy Management and Power Sharing Control using Power Line Communication
Published 2019“…This paper proposes an effective power dispatch strategy for clustered micro-grids. The developed hybrid algorithm implements optimal energy management and power sharing control using binary data. …”
Get full text
Get full text
Get full text
Proceeding -
10
-
11
Detecting lung cancer region from CT image using meta-heuristic optimized segmentation approach
Published 2022“…In this paper, the butterfly optimization algorithm-based K-means clustering (BOAKMC) method is introduced for reducing CT image segmentation uncertainty. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
13
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
14
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
16
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
17
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
