Search Results - (( its application clustering algorithm ) OR ( based application testing algorithm ))*
Search alternatives:
- application clustering »
- application testing »
- based application »
- testing algorithm »
- its application »
-
1
Data clustering using the bees algorithm
Published 2007Get full text
Get full text
Conference or Workshop Item -
2
Parallelization of noise reduction algorithm for seismic data on a beowulf cluster
Published 2010Get full text
Get full text
Citation Index Journal -
3
Support Vector Machines (SVM) in Test Extraction
Published 2006“…Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
Get full text
Get full text
Final Year Project -
4
Support Vector Machines (SVM) in Test Extraction
Published 2006“…Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
Get full text
Get full text
Final Year Project -
5
-
6
-
7
Cluster head selection algorithm using fuzzy logic in multi-tier Wireless Sensor Network for energy efficiency / Wan Isni Sofiah Wan Din
Published 2016“…Hence, this study proposes a new algorithm called Multi-Tier Protocol (MAP). MAP introduced clustering scheme to reduce the energy consumption of wireless sensor network in which, Fuzzy Logic used as tools to select the cluster head and multi-hop communication is used to route the data from the cluster head to the base station. …”
Get full text
Get full text
Thesis -
8
-
9
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
Get full text
Get full text
Thesis -
10
-
11
Data Transformation Model For Addressing Incomplete And Inconsistent Quality Issues Of Big Data
Published 2024“…The complete and consistent data are put into clusters, and the designed algorithm predicts the position of any incomplete and inconsistent data, based on its value to be added to the specific cluster. …”
Get full text
Get full text
Get full text
Thesis -
12
-
13
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
Published 2023“…A new consensus algorithm based on proof of identity authentication is adapted to the limited computational capabilities of IoT devices. …”
Get full text
Get full text
Article -
14
-
15
A machine learning approach of predicting high potential archers by means of physical fitness indicators
Published 2019“…k-nearest neighbour (k-NN) has been shown to be an effective learning algorithm for classification and prediction. However, the application of k-NN for prediction and classification in specific sport is still in its infancy. …”
Get full text
Get full text
Article -
16
A machine learning approach of predicting high potential archers by means of physical fitness indicators
Published 2019“…k-nearest neighbour (k-NN) has been shown to be an effective learning algorithm for classification and prediction. However, the application of k-NN for prediction and classification in specific sport is still in its infancy. …”
Get full text
Get full text
Get full text
Article -
17
A Hybrid Rough Sets K-Means Vector Quantization Model For Neural Networks Based Arabic Speech Recognition
Published 2002“…The rough sets vector quantization model proved its usefulness in the speech recognition framework, however it can be extended to different applications that involve large amounts of data such as speaker verification.…”
Get full text
Get full text
Thesis -
18
RECURSIVE LEARNING ALGORITHMS ON RBF NETWORKS FOR NONLINEAR SYSTEM IDENTIFICATION
Published 2010“…This thesis proposes derivative free learning, using finite difference, methods for fixed size RBF network in comparison to gradient based learning for the application of system identification. …”
Get full text
Get full text
Get full text
Thesis -
19
Power management system for smart microgrid considering meteorological and load demand data / Sam Koohikamali
Published 2015“…Microgrid is able to supply its local load based on operator decision and decline the power oscillations caused by solar photovoltaic (PV) plant together with variable loads. …”
Get full text
Get full text
Thesis -
20
