Search Results - (( java application clustering algorithm ) OR ( changes evaluation window algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Performance evaluation and enhancement of EDCA protocol to improve the voice capacity in wireless network by Abu-Khadrah, Ahmed Ismail Mohammad

    Published 2017
    “…The idea of the algorithm was based on creating different contention window ranges between access point and wireless workstations, and changing the technique of increasing the contention window value when the collision happened. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Efficient management of Top-k queries over Uncertain Data Streams with dynamic Sliding Window Model by Raja Wahab, Raja Azhan Syah

    Published 2024
    “…The algorithm development combines the frameworks from Phases 1 to 3, evaluating real and synthetic datasets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Efficient back-off mechanism for multimedia support in IEEE 802.11E by Al-Nuaimi, Aws Ali Shakir

    Published 2012
    “…The performance evaluations are conducted by using NS-2 simulator. The simulation results demonstrate that the proposed algorithm has greatly outperformed the previous mechanisms such as the non-linear dynamic adaptation scheme of the minimum contention window (CWmin HA), dynamic adaptation algorithm of the maximum contention window (CWmax adaptation), Adaptive Enhanced Distributed Coordination Function (AEDCF), Random adaptive MAC parameters scheme RAMPS and the conventional EDCA mechanism. …”
    Get full text
    Get full text
    Thesis
  8. 8

    A web-based implementation of k-means algorithms by Lee, Quan

    Published 2022
    “…Firstly, k-luster could incorporate additional clustering algorithms, or even classification algorithms in the future. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9
  10. 10

    A New Pre-Processing Technique For Computational Of Stereo Matching Algorithm by Kadmin, Ahmad Fauzan, Hamzah, Rostam Affendi, Abd Manap, Nurulfajar, Hamid, Mohd Saad

    Published 2021
    “…Based on Middlebury Standard Benchmarking Dataset, the proposed algorithm has 23.35% accuracy for nonocc error and 31.65% accuracy for all error, which yields a better accuracy compared to some works in the evaluation dataset.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    High performance through wall human activity recognition using WiFi by Wong, Yan Chiew, Abuhoureyah, Fahd, Mohd Isira, Ahmad Sadhiqin, Chuah, Joon Huang

    Published 2023
    “…We also implemented a CSI-based model using Nexmon with an LSTM algorithm with commodity WiFi devices and evaluated it in several environments. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…As a comparative study, the performance of the algorithms was evaluated based on various standard metrics. …”
    Get full text
    Get full text
    Thesis
  13. 13

    An integrated model of automated elementary programming feedback using assisted and recommendation approach by Safei, Suhailan

    Published 2017
    “…Meanwhile, similar difficulty groups of the computer programs were generated using a K-Means clustering algorithm that was enhanced with ranking consideration. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    An efficient trust-based decision-making approach for WSNs: Machine learning oriented approach by Khan, T., Singh, K., Shariq, M., Ahmad, K., Savita, K.S., Ahmadian, A., Salahshour, S., Conti, M.

    Published 2023
    “…Simulation experiments exhibit the effectiveness of the proposed trust evaluation method in terms of change in trust values, malicious nodes detection (94), FNR (0.9), F1-Score (0.6), and accuracy (92) in the presence of 50 malicious nodes. …”
    Get full text
    Get full text
    Article
  15. 15

    A hybrid rate control mechanism for forwarding and congestion control in named data network by Alsamman, Mohammed Gamal

    Published 2020
    “…Therefore, transport algorithms which use conventional paradigms would not work correctly in the NDN environment, since the content source location frequently changes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Relationship between deforestation and land surface temperature across an elevation gradient using satellite imagery in Cameron Highlands, Malaysia by How, Darren Jin Aik

    Published 2021
    “…The specific objectives were three folds; (i) to detect Land Use and Land Cover Change (LULCC) between 2009 and 2019 in Cameron Highlands, (ii) to evaluate the relationship between Land Use and Land Cover Change (LULCC) and Land Surface Temperature (LST) using Landsat and MODIS imageries, and (iii) to assess Land Use and Land Cover Changes (LULCC) of different forest types across an altitude gradient. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Ensemble learning using multi-objective optimisation for arabic handwritten words by Ghadhban, Haitham Qutaiba

    Published 2021
    “…Multi-Objective Ensemble Oriented (MOEO) formulated to control the classifier topology and provide feedback support for changing the classifiers' topology and weights based on the extension of Non-dominated Sorting Genetic Algorithm (NSGA-II). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Development of a Production Planning and Control Software in Total Productivity Maintenance Environment by Lee, Pang Seng

    Published 2004
    “…A TPM based software program has been developed to ease the process of production planning and control in TPM environment by executing sequential methodology such as problem identification, literature review, problem formulation, data coliection, company operation review, flow chart system and program algorithm before test run in the company. This program has been created in Window format and encoded using Microsoft Visual Basic 6.0. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Adaptive linux-based TCP congestion control algorithm for high-speed networks by Alrshah, Mohamed A.

    Published 2017
    “…Moreover, the AF-based CCA shows lower sensitivity to the change of buffer size and packet error rate, which increases its efficiency. …”
    Get full text
    Get full text
    Thesis