Search Results - (( basic normalization techniques algorithm ) OR ( java implementation towards algorithm ))

Refine Results
  1. 1

    Improved normalization and standardization techniques for higher purity in K-means clustering by Dalatu, Paul Inuwa, Fitrianto, Anwar, Mustapha, Aida

    Published 2016
    “…Clustering is an unsupervised classification method with aim of partitioning, where objects in the same cluster are similar, and objects belong to different clusters vary significantly, with respect to their attributes. The K-means algorithm is a famous and fast technique in non-hierarchical cluster algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation by Abu, Ahmad Zaidee

    Published 2008
    “…It terms of security, with the combination of Distorted DC permutation (DDP), it was considered to be having medium security based on some basic attack analysis that was carried out. It is also shown that this technique is fully format compliance as most of other techniques do. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…It does not consider the LACE algorithm implemented in huge number of server in one Cloud datacenter. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…This thesis steps towards developing a networked game, Literati game system that supporting two players at one time. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…The method was implemented using Java and the results of the simulation were evaluated using five standard performance metrics: accuracy, AUC, precision, recall, and f-Measure. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Metaheuristic-Based Neural Network Training And Feature Selector For Intrusion Detection by Ghanem, Waheed Ali Hussein Mohammed

    Published 2019
    “…Considering the wide success of swarm intelligence methods in optimization problems, the main objective of this thesis is to contribute to the improvement of intrusion detection technology through the application of swarm-based optimization techniques to the basic problems of selecting optimal packet features, and optimal training of neural networks on classifying those features into normal and attack instances. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Text classification using Naive Bayes: An experiment to conference paper by Sainin, Mohd Shamrie

    Published 2005
    “…The basic text classification technique in forum application has been discussed in Sainin (2005a) and Sainin (2005b).The paper explains about the use of the basic naïve Bayes algorithm to classify forum text me ssages into two classes namely clean and bad. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Modeling Computational Problem Solving (CPS) is the main issue in teaching programming where the given text is needed to be transformed into a model then later into a programming language. Various CPS techniques have been proposed such as PAC, IPO, Flowchart and Algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Neural network paradigm for classification of defects on PCB by Heriansyah, Rudi, Syed Al-Attas, Syed Abdul Rahman, Zabidi, Muhammad Mun'im Ahmad

    Published 2003
    “…The algorithms to segment the image into basic primitive patterns, enclosing the primitive patterns, patterns assignment, patterns normalization, and classification have been developed based on binary morphological image processing and Learning Vector Quantization (LVQ) neural network. …”
    Get full text
    Get full text
    Article
  13. 13

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    Early detection of spots high water saturation for landslide prediction using thermal imaging analysis by Ghazali, K. H., Mohd Falfazli, Mat Jusof, Muhammad, Badaruddin, Jadin, Mohd Shawal

    “…The result reveals that HSV color space technique provides the best segmentation with average misclassification error equals to 0.00165 for abnormal images, 0.0061 for normal images and 0.0014 for combination of abnormal and normal images. …”
    Get full text
    Get full text
    Research Report
  17. 17

    Optical tactile sensor for robotic assisted surface characterization / Amir Abd Latif

    Published 2016
    “…The aim of this research is to develop a new automated technique for an optical tactile sensor in measuring normal and shear force for surface characterization. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…The main aspect of this thesis is to produce a network monopoly system, which process multiple game sessions concurrently, enabling users to play the graphical game with people within the network. The algorithm design and implementation method mustnot only be workable, but also highly efficient in terms of execution speed and respond time. …”
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    Machine learning as new approach for predicting of maxillary sinus volume, a sexual dimorphic study by Hamd, Zuhal Y., Aljuaid, Hanan, Alorainy, Amal I., Osman, Eyas G., Abuzaid, Mohamed, Elshami, Wiam, Elhussein, Nagwan, Gareeballah, Awadia, Pathan, Refat Khan, Naseer, K.A., Khandaker, Mayeen Uddin *, Ahmed, Wegdan

    Published 2023
    “…In this retrospective study, we used data from 150 patients with normal maxillary sinuses to train and evaluate a Python ML algorithm for its ability to predict MSV from basic patient demographics (age, gender) and sinus length measurements in three directions (anteroposterior, mediolateral, and superoinferior). …”
    Get full text
    Get full text
    Get full text
    Article