Search Results - (( based application during algorithm ) OR ( its applications clustering algorithm ))

Refine Results
  1. 1

    Modified ACS centroid memory for data clustering by Jabbar, Ayad Mohammed, Ku-Mahamud, Ku Ruhana, Sagban, Rafid

    Published 2019
    “…Centroids will be identified based on the adaptive instance route. A comparison of the performance of several common clustering algorithms using real-world data sets shows that the accuracy of the proposed algorithm surpasses those of its counterparts.…”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3
  4. 4

    Off-the-shelf indoor localization system using radio frequency for wireless local area network by Alhammadi, Abdulraqeb Shaif Ahmed

    Published 2018
    “…In this research, a fingerprinting-based location algorithm is applied in indoor environments using WLAN. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7
  8. 8

    Stability improvement low energy adaptive clustering hierarchy routing (sileach) protocol for wireless sensor network by Jasim, Al-Haddad Zaid Ali

    Published 2017
    “…It balances the load among nodes by utilizing node residual energy and its distance to Base Station in the process of cluster head selection and utilizing node distance to Base Station during the process of Cluster formation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Stability improved of improved low energy adaptive clustering hierarchy routing protocol for wireless sensor network by Sabah Talib, Al-Zubaidi Ammar

    Published 2017
    “…It balances the load among nodes by utilizing node residual energy and its distance to Base Station in the process of cluster head selection and utilizing node distance to Base Station during the process of Cluster formation. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means by Chimphlee, Witcha, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan, Chimphlee, Siriporn

    Published 2005
    “…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…Nowadays, in the grid community, distributed and clustering system, a lot of work has been focused on providing efficient and safe replication management services through designing of algorithms and systems. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20