Search Results - (( its application clustering algorithm ) OR ( based application testing algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
    Get full text
    Get full text
    Final Year Project
  5. 5
  6. 6
  7. 7

    Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din by Wan Din, Wan Isni Sofiah

    Published 2016
    “…Hence, this study proposes a new algorithm called Multi-Tier Protocol (MAP). MAP introduced clustering scheme to reduce the energy consumption of wireless sensor network in which, Fuzzy Logic used as tools to select the cluster head and multi-hop communication is used to route the data from the cluster head to the base station. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data by Onyeabor, Grace Amina

    Published 2024
    “…The complete and consistent data are put into clusters, and the designed algorithm predicts the position of any incomplete and inconsistent data, based on its value to be added to the specific cluster. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks by Al Ahmed, Mahmoud Tayseer, Hashim, Fazirulhisyam, Hashim, Shaiful Jahari, Abdullah, Azizol

    Published 2023
    “…A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    A machine learning approach of predicting high potential archers by means of physical fitness indicators by Muazu Musa, Rabiu, Abdul Majeed, Anwar P.P., Taha, Zahari, Chang, Siow Wee, Ab. Nasir, Ahmad Fakhri, Abdullah, Mohamad Razali

    Published 2019
    “…k-nearest neighbour (k-NN) has been shown to be an effective learning algorithm for classification and prediction. However, the application of k-NN for prediction and classification in specific sport is still in its infancy. …”
    Get full text
    Get full text
    Article
  16. 16

    A machine learning approach of predicting high potential archers by means of physical fitness indicators by Musa, Rabiu Muazu, Anwar, P. P. Abdul Majeed, Zahari, Taha

    Published 2019
    “…k-nearest neighbour (k-NN) has been shown to be an effective learning algorithm for classification and prediction. However, the application of k-NN for prediction and classification in specific sport is still in its infancy. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition by Babiker, Elsadig Ahmed Mohamed

    Published 2002
    “…The rough sets vector quantization model proved its usefulness in the speech recognition framework, however it can be extended to different applications that involve large amounts of data such as speaker verification.…”
    Get full text
    Get full text
    Thesis
  18. 18

    RECURSIVE LEARNING ALGORITHMS ON RBF NETWORKS FOR NONLINEAR SYSTEM IDENTIFICATION by CATUR ANDRYANI, NUR AFNY

    Published 2010
    “…This thesis proposes derivative free learning, using finite difference, methods for fixed size RBF network in comparison to gradient based learning for the application of system identification. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Power management system for smart microgrid considering meteorological and load demand data / Sam Koohikamali by Sam , Koohikamali

    Published 2015
    “…Microgrid is able to supply its local load based on operator decision and decline the power oscillations caused by solar photovoltaic (PV) plant together with variable loads. …”
    Get full text
    Get full text
    Thesis
  20. 20