Search Results - (( construct visualization means algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- construct visualization »
- normalization algorithm »
- visualization means »
- data normalization »
- means algorithm »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
Virtual GIS walkthrough Innovation Center / Mohd Sufean Abu Samah
Published 1999Get full text
Get full text
Thesis -
5
Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms
Published 2023“…Lastly, the data are visualized using graphs and charts and an overall visualization dashboard is generated for data reporting which helps to analyze and extract meaning behind the sentiments by relating the visualizations with real-life events from legitimate sources such as news and articles. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
6
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
7
-
8
Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic
Published 2012“…The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
Get full text
Get full text
Get full text
Thesis -
9
Design and development of latex mark visual detection system
Published 2025Get full text
Get full text
Get full text
Article -
10
Near infrared palm image acquisition and two-finger valley point-based image extraction for palm vascular pattern detection
Published 2019“…In summary, vascular pattern can be detected visually from the palm image acquired by the NIR palm image acquisition device developed in this research.…”
Get full text
Get full text
Thesis -
11
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Using the line array representation as an alternative method for understanding whole number multiplication among primary students
Published 2015“…Overall, the resulting measures have shown to have good reliability as indicated by a Cronbach's alpha value of 0.79 for Year 3 and 0.82 for Year 5. The higher mean person estimates (Year 3 = +0.27 logits and Year 5 = +0.98 logits) compared with the mean item threshold defaulted at 0.00 logit showed that items were likely well matched for Year 3 students and easy for Year 5 students. …”
Get full text
Get full text
Get full text
Thesis -
13
Development and characterization of anonymous nuclear markers to determine genetic variation in two groupers species and their hybrids
Published 2015“…An unweighted pair-group method with arithmetic mean (UPGMA) phenogram was constructed based on the GD and CCC values to verify the genetic relationship among the grouper broodstock operational taxonomic units (OTUs). …”
Get full text
Get full text
Get full text
Thesis -
14
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…Wavelet Packet Decomposition (WPD), mean of amplitude, coherence, crosscorrelation, hjorth parameter and mutual information were used construct the proposed person authentication model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Performance evaluation on quantized weight for convolutional neural network based object detection
Published 2021“…Three types of scalar quantization are used to quantize the CNN weights namely symmetric uniform quantizer, asymmetric uniform quantizer and non-uniform quantizer designed using k-means algorithm. The quantization reduces the storage and computation requirements. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Fusion model of unmanned aerial vehicle-based digital elevation model for accuracy improvement mapping
Published 2020“…The photos were processed using Agisoft algorithm. In the end, seven DEMs were exported in tiff file format. …”
Get full text
Get full text
Thesis
