Search Results - (( work detection clustering algorithm ) OR ( java application optimization algorithm ))
Search alternatives:
- application optimization »
- detection clustering »
- java application »
- work detection »
-
1
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
Get full text
Get full text
Get full text
Article -
2
The multiple outliers detection for circular univariate data using different agglomerative clustering algorithms
Published 2024“…This study proposes the procedure of detecting multiple outliers, particularly for univariate circular data based on agglomerative clustering algorithms. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Development Of Human Skin Detection Algorithm Using Multilayer Perceptron Neural Network And Clustering Method
Published 2017“…The Differential Evolution Algorithm (DE) is used in this work to select the optimum color and texture information to achieve the optimum response. …”
Get full text
Get full text
Thesis -
4
An enhanced binary bat and Markov clustering algorithms to improve event detection for heterogeneous news text documents
Published 2022“…Event Detection (ED) works on identifying events from various types of data. …”
Get full text
Get full text
Thesis -
5
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
6
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
7
Drone Based Image Processing For Precision Agriculture
Published 2019“…At first, the parallel K-means clustering algorithm was applied on the acquired image to segregate various components acquired using UAV. …”
Get full text
Get full text
Monograph -
8
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
9
Framework for stream clustering of trajectories based on temporal micro clustering technique
Published 2018“…The clustering algorithm consists of two components: the temporal micro-clusters generation and the temporal micro clusters merging. …”
Get full text
Get full text
Thesis -
10
Data redundancy reduction scheme for data aggregation in wireless sensor network
Published 2020“…This research proposes Data Redundancy Reduction Scheme (DRRS) which includes three algorithms namely, Metadata Classification (MC), Selection Active Nodes (SAN) and Anomaly Detection (AD) algorithms that works before data aggregation, when multiple composite events simultaneously occur in the different locations within the cluster. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Improvement anomaly intrusion detection using Fuzzy-ART based on K-means based on SNC Labeling
Published 2011“…This paper presents our work to improve the performance of anomaly intrusion detection using Fuzzy-ART based on the K-means algorithm. …”
Get full text
Get full text
Get full text
Article -
12
-
13
A Recent Research on Malware Detection Using Machine Learning Algorithm: Current Challenges and Future Works
Published 2023Conference Paper -
14
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
15
An improved hybrid learning approach for better anomaly detection
Published 2011“…In recent years, data mining approach for intrusion detection have been proposed and used such as neural networks, clustering, genetic algorithms, decision trees, and support vector machines. …”
Get full text
Get full text
Thesis -
16
Dealing with Routing Hole Problem in Multi-hop Hierarchical Routing Protocol in Wireless Sensor Network
Published 2019“…First, a routing hole detection algorithm is proposed prior to designing the routing protocol which decreases about 30 percent energy consumption rate, detection time and detection overhead. …”
Get full text
Get full text
Thesis -
17
Revolutionizing Perimeter Intrusion Detection: A Machine Learning-Driven Approach with Curated Dataset Generation for Enhanced Security
Published 2023“…After collecting the data from above mentioned sensors we applied machine learning algorithms DBSCAN to cluster the data points and K-NN classification to classify those clusters in one-dimensional data, but the results were not much satisfying. …”
Get full text
Get full text
Article -
18
Data stream clustering by divide and conquer approach based on vector model
Published 2016“…The continuous effort on data stream clustering method has one common goal which is to achieve an accurate clustering algorithm. …”
Get full text
Get full text
Article -
19
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
20
Spectral texture segmentation of Magnetic Resonance Imaging (MRI) brain images for glioma brain tumour detection / Rosniza Roslan
Published 2013“…A new double thresholding algorithm and a fully automated multiple seed points selection algorithm that works on all three MRI image sequences are also proposed. …”
Get full text
Get full text
Thesis
