Search Results - (( variable detection clustering algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1

    Gas Identi cation by Using a Cluster-k-Nearest-Neighbor by Brahim Belhaouari, samir

    Published 2009
    “…We find 98.7% of accuracy in the classification of 6 different types of Gas by using K-means cluster algorithm and we find almost the same by using the new clustering algorithm.…”
    Get full text
    Get full text
    Article
  2. 2

    Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari by Satari, Siti Zanariah

    Published 2015
    “…Lastly, we consider the problem of detecting multiple outliers in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Cluster head selection using fuzzy logic and chaotic based genetic algorithm in wireless sensor network by Karimi, Abbas, Abedini, S. M., Zarafshan, Faraneh, Syed Mohamed, Syed Abdul Rahman Al-Haddad

    Published 2013
    “…Then, the number and place of cluster heads are determined in base station by using genetic algorithm based on chaotic. …”
    Get full text
    Get full text
    Article
  5. 5

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Improved robust estimator and clustering procedures for multivariate outliers detection by Sharifah Sakinah, Syed Abd Mutalib

    Published 2023
    “…Outlier detection for multivariate data has been one of the areas that garnered attention to study due to the difficulty that arises as the number of variables, p increases. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  10. 10

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…LR model was used to find the corresponding coefficients of best fitting function that assess the optimal terminal nodes. A cluster pattern of landslide locations was extracted in previous study using nearest neighbor index (NNI), which were then used to identify the clustered landslide locations range. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    On the earthquake distribution modeling in Sumatra by Cauchy cluster process : comparing log-linear and log-additive intensity models by Susanto, Tabita Yuni, Choiruddin, Achmad, Purnomo, Jerry Dwi Trijoyo

    Published 2023
    “…Inhomogeneous cluster point processes have been considered for modeling the distribution of earthquake epicenters with the spatial trend and clustering patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  20. 20