Search Results - (( _ normalization based algorithm ) OR ( java application during algorithm ))
Search alternatives:
- normalization based »
- application during »
- java application »
- during algorithm »
-
1
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
2
A novel normal parameter reduction algorithm of soft sets
Published 2010“…In this paper, we propose a novel normal parameter reduction algorithm of soft sets based on the oriented-parameter sum, which can be carried out without parameter important degree and decision partition. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
4
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
Published 2008“…The proposed approach uses a frequency domain combinational framework of coefficients scrambling with Key Scheduling Algorithm based (KSA-based) permutation. This novel algorithm applies coefficients scrambling using Combined-Reverse-and-Normal-Direction (CRND) scanning together with Distorted DC permutation (DDP). …”
Get full text
Get full text
Thesis -
5
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Text normalization algorithm for facebook chats in Hausa language
Published 2014“…It was found that our proposed algorithm was able to normalized Hausa NSWs with an accuracy of 100%. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…Therefore, a variable selection technique using a swarm-based Binary Bat algorithm is proposed. Specifically, a normalization-based Binary Bat algorithm is used, where discretization of continuous solution into binary form is performed using a normalization equation. …”
Conference paper -
9
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
Get full text
Get full text
Monograph -
10
Towards the utilization of normalized LMS algorithm in adaptive filter
Published 2014“…The analysis was mainly concentrated on the adapted algorithms’ performance. This study provides the insights necessary for considering other filtering mechanisms based on the normalized least mean square.…”
Get full text
Get full text
Get full text
Article -
11
Non-invasive pathological voice classifications using linear and non-linear classifiers
Published 2010“…Linear classifier namely LDA based classifier and non-linear classifiers such as k-NN classifier, MLP network, PNN, and GRNN are suggested to discriminate pathological voices from normal voices. …”
Get full text
Thesis -
12
Improved normalization and standardization techniques for higher purity in K-means clustering
Published 2016“…Based on its simplicity, the K-means algorithm has been used in many fields. …”
Get full text
Get full text
Get full text
Article -
13
An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms
Published 2015“…It is concluded that the resultant hybrid techniques can perform well if the variables provided to normalization by neighborhood model (MF and CF) do not have big differences in order for the hybrid normalization model to outperform every algorithm in comparison.…”
Get full text
Get full text
Thesis -
14
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
15
Classification of Cardiac Disorders Based on Electrocardiogram Data with Fuzzy Cognitive Map (FCM) Algorithm Approach
Published 2021Get full text
Get full text
Conference or Workshop Item -
16
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…This result help to expand the view of new idea in modelling the tele-traffic algorithm based on bandwidth management and time processing improvement. …”
Get full text
Get full text
Thesis -
17
Transform based approach for ECG period normalization
Published 2011Get full text
Get full text
Get full text
Proceeding Paper -
18
Normal-boundary intersection based parametric multi-objective optimization of green sand mould system
Published 2013“…In this work, a novel approach that merges meta-heuristic algorithms with the Normal Boundary Intersection (NBI) method is introduced. …”
Get full text
Get full text
Article -
19
Short term forecasting based on hybrid least squares support vector machines
Published 2018“…This study assesses the performance of each hybrid algorithms based on three statistical indices viz. Mean Square Error (MSE), Root Mean Square Percentage Error (RMSPE) and Theil’s U which is realized on raw and normalized data set. …”
Get full text
Get full text
Get full text
Article -
20
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph
