Search Results - (( data identification means algorithm ) OR ( java application using algorithm ))
Search alternatives:
- identification means »
- data identification »
- java application »
- means algorithm »
- using algorithm »
-
1
An improved plant identification system by Fuzzy c-means bag of visual words model and sparse coding
Published 2020“…This demonstrate the intensity of the correlation between that aspect of data and a specific cluster. In the classic Bag of visual words model, the Fuzzy c-means algorithm is replaced with K-means and the accuracy of SIFT matching is increased. …”
Get full text
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
System identification using Extended Kalman Filter
Published 2017“…Besides, Extended Kalman Filter (EKF) algorithm was selected in this project as an algorithm for offline estimation data purposes. …”
Get full text
Get full text
Student Project -
4
-
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
Gas Identi cation by Using a Cluster-k-Nearest-Neighbor
Published 2009“…We find 98.7% of accuracy in the classification of 6 different types of Gas by using K-means cluster algorithm and we find almost the same by using the new clustering algorithm.…”
Get full text
Get full text
Article -
7
Data mining based damage identification using imperialist competitive algorithm and artificial neural network
Published 2018“…In this study, to predict the damage severity of sin-gle-point damage scenarios of I-beam structures a data mining based damage identification framework and a hybrid algorithm combining Artificial Neural Network (ANN) and Imperial Competitive Algorithm (ICA), called ICA-ANN method, is proposed. …”
Get full text
Get full text
Article -
8
Big Data Mining Using K-Means and DBSCAN Clustering Techniques
Published 2022“…A variety of data mining techniques were used to address the problem; three steps of data pre-processing were applied, namely the cleaning of data, the identification of users, and the identification of sessions. …”
Get full text
Get full text
Article -
9
Development of an effective clustering algorithm for older fallers
Published 2022“…The proposed algorithm was developed through the stages of: data pre-processing, feature identification and extraction with either t-Distributed Stochastic Neighbour Embedding (t-SNE) or principal component analysis (PCA)), clustering (K-means clustering, Hierarchical clustering, and Fuzzy C-means clustering) and characteristics interpretation with statistical analysis. …”
Get full text
Get full text
Article -
10
-
11
Identification of continuous-time hammerstein model using improved archimedes optimization algorithm
Published 2024“…Improved mean fitness function values were also revealed in the TRS (11.63%) and EMPS (69.63%) assessments, surpassing the conventional algorithm. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure
Published 2023“…A square aluminium plate experimental rig with a gradient of 30° and all edges clamped were designed and fabricated to acquire input-output vibration data experimentally. This input-output data was then applied in a system identification method, which used an evolutionary algorithm with a linear autoregressive with exogenous (ARX) model structure to generate a dynamic model of the system. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Implementation of Evolutionary Algorithms to Parametric Identification of Gradient Flexible Plate Structure
Published 2023“…A square aluminium plate experimental rig with a gradient of 30° and all edges clamped were designed and fabricated to acquire input-output vibration data experimentally. This input-output data was then applied in a system identification method, which used an evolutionary algorithm with a linear autoregressive with exogenous (ARX) model structure to generate a dynamic model of the system. …”
Get full text
Get full text
Get full text
Article -
14
MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM
Published 2011“…The experimental result shows that the proposed hybrid k-mean plus MFP algorithm can generate more useful pattern from large stock data.…”
Get full text
Get full text
Citation Index Journal -
15
Real-time system identification of an unmanned quadcopter system using fully tuned radial basis function neural networks
Published 2021“…In this paper, we present the performance analysis of a fully tuned neural network trained with the extended minimal resource allocating network (EMRAN) algorithm for real-time identification of a quadcopter. …”
Get full text
Get full text
Article -
16
MINING CUSTOMER DATA FOR DECISION MAKING USING NEW HYBRID CLASSIFICATION ALGORITHM
Published 2011“…The experimental result shows that the proposed hybrid k-mean plus MFP algorithm can generate more useful pattern from large stock data.…”
Get full text
Get full text
Citation Index Journal -
17
Automatic clustering of generalized regression neural network by similarity index based fuzzy c-means clustering
Published 2004“…Similar data then undergoes fuzzy c-means iterative process to determine their cluster centers. …”
Get full text
Get full text
Get full text
Article -
18
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Flow regime identification of particles conveying in pneumatic pipeline using electric charge tomography and neural network techniques
Published 2006“…A high speed data acquisition card DAS1800HC is used to interface the sensors to a personal computer which processes the data using linear back projection algorithm (LBPA) and filtered back projection algorithm (FBPA). …”
Get full text
Get full text
Thesis -
20
Arabic Speaker Identification System for Forensic Authentication Using K-NN Algorithm
Published 2023Conference Paper
