Search Results - (( based application need algorithm ) OR ( its application clustering algorithm ))*

Refine Results
  1. 1

    Genetic algorithm optimized receiver-oriented packet clustering in multi-buffer network card by Nurika, O., Hassan, M.F., Zakaria, N., Jung, L.T.

    Published 2016
    “…Its optimization factors revolve around the number of buffers, the number of applications that need access to the clusters, capacity of each buffer, transmission size, packet size, and number of packets. …”
    Get full text
    Get full text
    Article
  2. 2

    Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm by Tan, Chee Kuan

    Published 2020
    “…This system will first cluster those addresses based on the number of trucks involved and then perform the route optimization algorithm to suggest the shortest route to the user. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3
  4. 4

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7

    Hyper-heuristic framework for sequential semi-supervised classification based on core clustering by Adnan, Ahmed, Muhammed, Abdullah, Abd Ghani, Abdul Azim, Abdullah, Azizol, Huyop @ Ayop, Fahrul Hakim

    Published 2020
    “…This article presents a prominent framework that integrates each of the NN, a meta-heuristic based on evolutionary genetic algorithm (GA) and a core online-offline clustering (Core). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Temporal - spatial recognizer for multi-label data by Mousa, Aseel

    Published 2018
    “…Hence, there is a need for a recognition algorithm that can separate the overlapping data points in order to recognize the correct pattern. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
    Get full text
    Get full text
    Article
  14. 14

    Anomaly detection of intrusion based on integration of rough sets and fuzzy c-means by Chimphlee, Witcha, Md. Sap, Mohd. Noor, Abdullah, Abdul Hanan, Chimphlee, Siriporn

    Published 2005
    “…The objective of this paper is to describe a rough sets and fuzzy c-means algorithms and discuss its usage to detect intrusion in a computer network. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Adaptive manet OLSR routing protocol for optimal route selection in high dynamic network by Al-Kharasani, Nori Mohammed Abdulkarem

    Published 2020
    “…To provide the necessary robustness, a new Cluster-based Adoptive Cooperative Algorithm (CACA) for VANET is introduced to improve the scalability of the network and reduce control overhead. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19
  20. 20

    Modified ACS centroid memory for data clustering by Jabbar, Ayad Mohammed, Ku-Mahamud, Ku Ruhana, Sagban, Rafid

    Published 2019
    “…A comparison of the performance of several common clustering algorithms using real-world data sets shows that the accuracy of the proposed algorithm surpasses those of its counterparts.…”
    Get full text
    Get full text
    Get full text
    Article