Search Results - (( basic information normalization algorithm ) OR ( java application during algorithm ))
Search alternatives:
- information normalization »
- normalization algorithm »
- application during »
- basic information »
- java application »
- during algorithm »
-
1
Surface Normals with Modular Approach and Weighted Voting Scheme in 3D Facial Expression Classification
Published 2014“…New insight in facial expression analysis is found particularly when no intensity information is provided. Surface normals does has a potential to be used as the feature vectors to classify six basic expressions.…”
Get full text
Get full text
Article -
2
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
3
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
4
Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif
Published 2016“…Tactile sensory information is an important design criterion in designing algorithm for robotic manipulation or physical interaction with surrounding environment. …”
Get full text
Get full text
Thesis -
5
Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection
Published 2019“…However, the training datasets usually compose feature sets of irrelevant or redundant information, which impacts the performance of classification, and traditional learning algorithms such as backpropagation suffer from known issues, including slow convergence and the trap of local minimum. …”
Get full text
Get full text
Thesis -
6
-
7
Performance enhancement of adaptive cluster formation and routing protocols in wireless networks
Published 2017“…The IVRP, EBCRA and ESRSBRP performance have been compared with the other routing algorithms. The efficiency and scalability of the proposed algorithms are measured based on different performance metrics, namely: throughput, packet delivery ratio, end to end delay, the number of dropped packets and normalized control overhead. …”
Get full text
Get full text
Get full text
Thesis -
8
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Comparison of Landsat 8, Sentinel-2 and spectral indices combinations for Google Earth Engine-based land use mapping in the Johor River Basin, Malaysia
Published 2021“…It is also an indispensable basic information for local land management departments in land use planning and management. …”
Get full text
Get full text
Get full text
Article -
10
Students Activity Recognition By Heart Rate Monitoring In Classroom Using K-means Classification
Published 2024Get full text
journal::journal article -
11
Nomadic people optimizer (NPO) for large-scale optimization problems
Published 2019“…The basic component of the algorithm consists of several clans and each clan searches for the best place (or best solution) based on the position of their leader. …”
Get full text
Get full text
Thesis -
12
Challenges of hidden data in the unused area two within executable files
Published 2009“…Approach: The system designed to accommodate the release mechanism that consists of two functions; first is the hiding of the information in the unused area 2 of PE-file (exe.file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information). …”
Get full text
Get full text
Get full text
Article -
13
-
14
Robust Kernel Density Function Estimation
Published 2010“…Additionally, they are able to assign anomaly scores to normal and outlying observations. Finally this thesis also addresses the estimation of Mutual Information (MI) for mixture distribution which prone to create two distant groups in the data. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Tasks Distribution In Driver Scheduling Using Dynamic Set Of Bandwidth In Harmony Search Algorithm With 2-Opt
Published 2021“…Therefore, a tasks distribution in driver scheduling using dynamic set of bandwidth in harmony search algorithm with 2-opt (SBHS2-opt) was proposed in this research. …”
Get full text
Get full text
Get full text
Thesis -
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
20
Prediction of epidemic peak and infected cases for COVID-19 disease in Malaysia, 2020
Published 2023Article
