203 results found.
Year: 2015, Volume: 15, Number: 1
... many simulations have also verified the effectiveness of As an important auxiliary system which can improve the fault factor analysis. In paper [20], based on fuzzy cluster operation safety of power system, WAMS will become an analysis theory and the principle of minimum expected cost of misclassification, a comprehensive detection and isolation 1 system ...
Terms matched: 1 - Score: 6 - 583k
Year: 2014, Volume: 14, Number: 4
... it will be reset and C several generations, E and C are likely pulled closer and randomly reinitialized. Upon resetting, k can be calculated their offspring are clustered together, leading to a low by (1) exploration level (narrow search). Eventually, timer t k  kmin  (kmax ï€ kmin ...
Terms matched: 1 - Score: 6 - 1,442k
Year: 2013, Volume: 13, Number: 4
... (Naval topically focused query probes. Ashraf et al. [11] proposed a Ocean Systems Center) to assess and to foster research on system that employed clustering techniques for automatic the automated analysis of military messages containing information extraction from HTML documents containing textual information. Gregg et al. [4] presented an adaptive ...
Terms matched: 1 - Score: 6 - 775k
Year: 2014, Volume: 14, Number: 2
... in a zigzag pattern, while k denotes the number are in a Non-uniform pattern (b) Tags are Scattered Randomly (c) Tags are placed in a Cluster (d) Tags are Uniformly placed in 3D space. of mobile readers involved in tracking process. TABLE I. CHARACTERISTICS OF ALL SCENARIOS. III. ...
Terms matched: 1 - Score: 6 - 1,674k
Year: 2016, Volume: 16, Number: 1
... adaptations and improvements to meet the specifications [3- improvements [25]. 5]. On the other hand, if the whole wireless sensor network The cluster based network organization is the present in has to function in a real-time manner, the communication almost all of the studies presented. In this configuration, the ...
Terms matched: 1 - Score: 6 - 1,036k
Year: 2020, Volume: 20, Number: 3
... Algorithm (BHA) was proposed in 2013 algorithms, the solution is given by the position in which a [21] as a heuristic method for solving data clustering bacterium reached its best healthy status. problems. It is inspired by the black hole attraction 2) Non swarm algorithms. phenomenon. The star (agent ...
Terms matched: 1 - Score: 6 - 1,239k
Year: 2011, Volume: 11, Number: 3
... this stage was to observe relationship between excess of 5000 samples), running the classifier at this stage input data (features of the speech samples). By clustering is not computationally efficient. Moreover, input signals the pronunciations we intended to discover how closely have different lengths generating feature vectors of different related are the different ...
Terms matched: 1 - Score: 5 - 869k
Year: 2011, Volume: 11, Number: 4
... [17] I. Jonyer, L. Holder and D. Cook. "Concept Formation Using Graph [6] R. Urquhar. "Graph theoretical clustering based on limited Grammars", In Proceedings of the KDD Workshop on Multi- neighborhood sets", In Pattern Recognition Letters, 15, pp. 173 ...
Terms matched: 1 - Score: 5 - 441k
Year: 2012, Volume: 12, Number: 2
... end technical architecture, Celtic [6] D. G. Andersen, A. C. Snoeren, and H. Balakrishnan, "Best-path Project – Eureka Cluster CP5-013 – MARCH, Review December versus multi-path overlay routing," in Proc. 3rd ACM SIGCOMM 2010. Available: http://projects.celtic- Conf ...
Terms matched: 1 - Score: 5 - 634k
Year: 2011, Volume: 11, Number: 4
... back-propagation for nonlinear parameters and segmentation gives optimal segmentation intervals for least squares method for linear parameters) and Modified differently colored objects. Hence, the segmentation finally Mountain Clustering (MMC) [16] technique for initial results in as many binary images as there are objects present neuro-fuzzy classifier structure determination have been in the image ...
Terms matched: 1 - Score: 5 - 561k