Search Results - (( its application system algorithm ) OR ( based applications clustering algorithm ))*

Refine Results
  1. 1
  2. 2
  3. 3
  4. 4

    Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream by Abdulateef, Alaa Fareed

    Published 2023
    “…This may be useful for real-world applications such as surveillance systems based on IoT and customer behaviour analytics systems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm by Tan, Chee Kuan

    Published 2020
    “…This system will first cluster those addresses based on the number of trucks involved and then perform the route optimization algorithm to suggest the shortest route to the user. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Enhanced weight-based clustering algorithm to provide reliable delivery for VANET safety applications by Bello Tambawal, Abubakar, Noor, Rafidah Md, Salleh, Rosli, Chembe, Christopher, Oche, Michael

    Published 2019
    “…In this study, enhanced weight-based clustering algorithm (EWCA) was developed to address these challenges. …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12

    Off-the-shelf indoor localization system using radio frequency for wireless local area network by Alhammadi, Abdulraqeb Shaif Ahmed

    Published 2018
    “…Location based services have been used in many mobile applications as well as wireless sensor networks. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
    Get full text
    Get full text
    Final Year Project
  14. 14

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…Each word in the particular document is processed by both algorithms to determine its actual occurrence in the document by which it will first be clustered or grouped into categories based on parts of speech (verb, noun, adjective) which is done by K-Means, then later processed by SVM to determine the actual occurrence of each word in each of the cluster, taking into account whether the words have similar meanings with otherwords in the subsequent cluster. …”
    Get full text
    Get full text
    Final Year Project
  15. 15
  16. 16

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Pashto language stemming algorithm by Aslamzai, Sebghatullah, Saidah Saad

    Published 2015
    “…There is lack of resources and tools that can be applied in different applications such as in document indexing, clustering, language processing, text analysis, database search systems, information retrieval, and linguistic applications. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    A framework of modified adaptive neuro-fuzzy inference engine by Hossen, Md. Jakir

    Published 2012
    “…A modified apriori algorithm was employed to reduce the number of clusters effectively on the basis of common data in the clusters of every input to obtain a minimal set of decision rules based on datasets. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm by Talib, Nihad Hasan

    Published 2020
    “…In the large-scale area application, the GBCS algorithm achieved 100%, 93.75%, and 98.9% coverage for Maluri, Subang, and TBS stations, respectively. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    A Survey Of Supervised Machine Learning In Wireless Sensor Network: A Power Management Perspective by Ul haq, Riaz, Norrozila, Sulaiman, Muhammad, Alam

    Published 2013
    “…Machine learning algorithms are iteration based algorithms, as the new knowledge is based on the previous predicted /calculated knowledge which helps to decrease errors in order to increase efficiency. …”
    Get full text
    Get full text
    Conference or Workshop Item