203 results found.
Year: 2021, Volume: 21, Number: 3
... color. Each slice has Lat and Lng for each cluster separately. If there are two contained 1, ... Identification Systems by a [6 ], Window-based encounter clustering [3] and KMeans novel clustering model using ... the set of coordinates and K is the number of clusters values. The data has been transferred from the ...
Terms matched: 3 - Score: 211 - 3,105k
Year: 2021, Volume: 21, Number: 2
... the following steps: can be made via local-global color histograms, partitioning  State transition – prediction, using the adopted motion of color spaces and use of a clustering algorithm, etc. [45]. model; The color histogram is most frequently used for this purpose  A computing of selected image features; due ...
Terms matched: 1 - Score: 1 - 1,876k
Year: 2021, Volume: 21, Number: 1
... . J. Chanu, "A survey on image segmentation compression techniques: Lossy and lossless," Int. J. Comput. Appl., methods using clustering techniques," Eur. J. Eng. Res. Sci., vol. 2, vol. 142, no. 6, pp. 23 ...
Terms matched: 1 - Score: 3 - 1,431k
Year: 2021, Volume: 21, Number: 1
... of the applicability of some advanced techniques, means of matrix-factorization with temporal course-wise particularly clustering, bi-clustering, matrix factorization, influence (MFTCI) has been addressed in ... 10] by graph-theoretic, and fuzzy techniques in recommender representing students and courses in a latent knowledge systems. However, the applicability of matrix factorization space. ( ...
Terms matched: 2 - Score: 6 - 1,387k
Year: 2021, Volume: 21, Number: 1
... , M. Curado, and E. Monteiro, "Cross-layer routing [4] K. A. Yitayih and M. Libsie, "Towards developing enhanced cluster- metrics for mesh networks: Current status and research directions," based QoS-Aware routing in MANET," Journal of Computer Computer Communications, vol. 34 ...
Terms matched: 1 - Score: 3 - 1,182k
Year: 2020, Volume: 20, Number: 4
... revocation scheme [30]. They measured the security and the based on a clustered tree was proposed for large-sized performance of the schemes by comparing them with each ... assumptions using a dual- system encryption technique with Lin et al. proposed a Cluster-based Elliptic Curve Key a constant-sized cipher text and a private key. Maiti and ...
Terms matched: 2 - Score: 9 - 1,552k
Year: 2020, Volume: 20, Number: 4
... been presented in complex way. Clustering-based approaches trust in cluster [12]. The proposed scheme can detect ... The IoV seems to play an important However, many clustering techniques and routing protocols role in developing the intelligent ... hazardous events and heads or leaders. Also, keeping clusters in consistent state notify neighboring vehicles to reduce traffic ...
Terms matched: 5 - Score: 46 - 1,131k
Year: 2020, Volume: 20, Number: 4
... used with DEEPSAM (personal) contributions are briefly explained below. on a computer cluster in the future. DPSTM v3 features fault tolerance: In this paper we ... an extension of software [30]. distributed shared-memory system (S-DSM) for clusters of Distributed PSTM version 1 (DPSTM v1) was introduced workstations, see ...
Terms matched: 2 - Score: 18 - 1,188k
Year: 2020, Volume: 20, Number: 4
... Multiobjective particle coordination dispatch in isolated power systems with large integration swarm algorithm with fuzzy clustering for electrical power dispatch," of wind capacity," Energy Conversion and ... ] for the MEED II. ECONOMIC AND EMISSION DISPATCH PROBLEM problem. A fuzzy clustering-based Particle Swarm (FCPSO) FORMULATION algorithm, which handles the size of the ...
Terms matched: 2 - Score: 5 - 1,225k
Year: 2020, Volume: 20, Number: 3
... Algorithm (BHA) was proposed in 2013 algorithms, the solution is given by the position in which a [21] as a heuristic method for solving data clustering bacterium reached its best healthy status. problems. It is inspired by the black hole attraction 2) Non swarm algorithms. phenomenon. The star (agent ...
Terms matched: 1 - Score: 6 - 1,239k