Search Results - (( variable validation clustering algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…In order to obtain the optimum number of clusters and at the same time could deal with correlated variables in huge data, modified k-means algorithm was proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Efficient genetic partitioning-around-medoid algorithm for clustering by Garib, Sarmad Makki Mohammed

    Published 2019
    “…These algorithms mostly built upon the partitioning k-means clustering algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Statistical performance of agglomerative hierarchical clustering technique via pairing of correlation-based distances and linkage methods by Nurshaziana, Mohamad Shamsuri

    Published 2025
    “…To validate the clustering model on real data, the Spearman-average algorithm was applied to cluster Juru river basin data based on five water quality parameters. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Prediction of Machine Failure by Using Machine Learning Algorithm by Fakhrurazi, Nur Amalina

    Published 2019
    “…Validation for the model is analyzed by using validation testing data and cross validation. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Seed disperser ant algorithm for optimization / Chang Wen Liang by Chang , Wen Liang

    Published 2018
    “…In this research, we applied SDAA to solve the constrained engineering problems and introduce an efficient data clustering algorithm which is hybrid of K-means and SDAA. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Application of Optimization Methods for Solving Clustering and Classification Problems by Shabanzadeh, Parvaneh

    Published 2011
    “…Intuitively, samples within a valid cluster are more similar to each other than they are to a sample belonging to a different cluster. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…In conventional hard clustering approach, the number of clusters was determined by hierarchical clustering and two-step cluster analysis; then the sites were allocated to the appropriate cluster by k-means clustering method. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Centre based evolving clustering framework with extended mobility features for vehicular ad-hoc networks by Talib, Mohammed Saad

    Published 2021
    “…This framework uses an evolving data clustering algorithm by adopting the concept of grid granularity to capture the features of a cluster more efficiently. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Independent And Dependent Job Scheduling Algorithms Based On Weighting Model For Grid Environment by M. Al-Najjar, Hazem

    Published 2018
    “…This thesis presents job weighting model using a Twostep clustering to assign the categorical and continuous variables of jobs into classes for both independent and dependent job scheduling. …”
    Get full text
    Get full text
    Thesis
  11. 11

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Landslide susceptibility mapping using decision-tree based chi-squared automatic interaction detection (CHAID) and logistic regression (LR) integration by Althuwaynee, Omar F., Pradhan, Biswajeet, Ahmad, Noordin

    Published 2014
    “…LR model was used to find the corresponding coefficients of best fitting function that assess the optimal terminal nodes. A cluster pattern of landslide locations was extracted in previous study using nearest neighbor index (NNI), which were then used to identify the clustered landslide locations range. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Predicting 30-day mortality after an acute coronary syndrome (ACS) using machine learning methods for feature selection, classification and visualization by Nanyonga Aziida, Sorayya Malek, Firdaus Aziz, Khairul Shafiq Ibrahim, Sazzli Kasim

    Published 2021
    “…Feature selection methods such as Boruta, Random Forest (RF), Elastic Net (EN), Recursive Feature Elimination (RFE), learning vector quantization (LVQ), Genetic Algorithm (GA), Cluster Dendrogram (CD), Support Vector Machine (SVM) and Logistic Regression (LR) were combined with RF, SVM, LR, and EN classifiers for 30-day mortality prediction. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A novel AI-driven EEG images emotion recognition generalized classification model for cross-subject analysis by Li, Jingjing, Lee, Ching Hung, Duan, Dingna, Zhou, Yanhong, Xie, Xueguang, Wan, Xianglong, Liu, Tiange, Li, Danyang, Yu, Hao, Hasan, W. Z.W., Song, Haiqing, Wen, Dong

    Published 2025
    “…However, the significant inter-individual variability in EEG signals complicates cross-subject analysis, thereby limiting their generalizability. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16
  17. 17
  18. 18
  19. 19

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis