Search Results - (( based evaluation window algorithm ) OR ( _ identification clustering algorithm ))
Search alternatives:
- identification clustering »
- evaluation window »
- based evaluation »
- window algorithm »
- _ identification »
-
1
Flexible window-based scheduling with critical worst case latency evaluations for real time traffic in time sensitive networks
Published 2022“…The first part introduces a flexible window-overlapping scheduling (FWOS) algorithm that allows the TT windows to overlap in GCL implementations. …”
Get full text
Get full text
Thesis -
2
The Effect Of Linkages In The Hierarchical Clustering Of Auto-Regressive Algorithm For Defect Identification In Heat Exchanger Tubes
Published 2019“…The AR algorithm characterizes the shape of the stress wave signals by AR coefficients and clustered using ‘centroid’ linkages. …”
Get full text
Get full text
Get full text
Article -
3
Gas Identi cation by Using a Cluster-k-Nearest-Neighbor
Published 2009“…We find 98.7% of accuracy in the classification of 6 different types of Gas by using K-means cluster algorithm and we find almost the same by using the new clustering algorithm.…”
Get full text
Get full text
Article -
4
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…Classic bag of visual words algorithm is based on k-means clustering and every SIFT features belongs to one cluster and it leads to decreasing classification results. …”
Get full text
Get full text
Get full text
Article -
5
Development of an effective clustering algorithm for older fallers
Published 2022“…The proposed fall risk clustering algorithm grouped the subjects according to features. …”
Get full text
Get full text
Article -
6
Efficient tag grouping RFID anti-collision algorithm for internet of things applications based on improved k-means clustering
Published 2023“…In the initialization stage, the reader uses improved K-means clustering running concurrently with a tag counter algorithm to cluster tags into K groups using tags RN16 while the counter returns an accurate tag number estimate. …”
Get full text
Get full text
Article -
7
Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network
Published 2017“…The idea of the algorithm was based on creating different contention window ranges between access point and wireless workstations, and changing the technique of increasing the contention window value when the collision happened. …”
Get full text
Get full text
Get full text
Thesis -
8
-
9
Application of fuzzy clustering analysis to compound datasets for drug lead identification
Published 2012“…However, there are little study on overlapping method such as fuzzy cmean (FCM) and fuzzy c-varieties (FCV) clustering algorithms. Therefore, these two clustering algorithms are applied and their performance is compared based on the effectiveness of the clustering results in terms of separation between actives and inactives (Pa) into different clusters and mean intercluster molecular dissimilarity (MIMDS). …”
Get full text
Get full text
Get full text
Proceeding -
10
Windows-Based bandwidth allocation on optical networks
Published 2009“…Now, in this paper related to our totally categorize of bandwidth allocation methods to three groups as Static, Router-Based and Windows-Based, we will explain seven major weaknesses on Windows-Based dynamic group and describe the improvements on them one by one. …”
Get full text
Get full text
Conference or Workshop Item -
11
Document clustering for knowledge discovery using nature-inspired algorithm
Published 2014“…As the internet is overload with information, various knowledge based systems are now equipped with data analytics features that facilitate knowledge discovery.This includes the utilization of optimization algorithms that mimics the behavior of insects or animals.This paper presents an experiment on document clustering utilizing the Gravitation Firefly algorithm (GFA).The advantage of GFA is that clustering can be performed without a pre-defined value of k clusters.GFA determines the center of clusters by identifying documents with high force.Upon identification of the centers, clusters are created based on cosine similarity measurement.Experimental results demonstrated that GFA utilizing a random positioning of documents outperforms existing clustering algorithm such as Particles Swarm Optimization (PSO) and K-means.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Evaluation of FCV and FCM clustering algorithms in cluster-based compound selection
Published 2011“…The analysis shows that in terms of MIMDS, the FCV is better than FCM because it clearly shown the uniform results compare to FCM clustering algorithm.…”
Get full text
Get full text
Get full text
Article -
13
An efficient fuzzy clustering algorithm for mining user session clusters on web log data
Published 2021“…This paper proposes an efficient Fuzzy Clustering algorithm for mining client session clusters from web access log information to find the groups of client profiles. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
-
15
-
16
Examining the round trip time and packet length effect on window size by using the Cuckoo search algorithm
Published 2016“…This signifies that the training was successful based on the fitted values of the window size. Thus the proposed model trained with the CS algorithm provides a high convergence rate to the true global minimum and a better optimal solution. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
RFID-enabled supply chain detection using clustering algorithms
Published 2015“…We will apply various clustering algorithms to analyzed and determine every attribute in the dataset structure pattern. …”
Get full text
Get full text
Conference or Workshop Item -
18
Unsupervised segmentation technique for acute leukemia cells using clustering algorithms
Published 2015“…Then, median filter and seeded region growing area extraction algorithms have been applied, to smooth the region of segmented blast and to remove the large unwanted regions from the image, respectively.Comparisons among the three clustering algorithms are made in order to measure the performance of each clustering algorithm on segmenting the blast area. …”
Get full text
Get full text
Article -
19
Worst-case latency analysis for AVB traffic under overlapping-based time-triggered windows in time-sensitive networks
Published 2022“…In this paper, a worst-case end-to-end delay (WCD) for AVB traffic under overlapping-based TT windows (AVB-OBTTW) algorithm is proposed. …”
Get full text
Get full text
Article -
20
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…The density-based spatial clustering of applications with noise (DBSCAN) and the K-means algorithm were used to develop clustering algorithms. …”
Get full text
Get full text
Article
