Search Results - (( developing _ sem algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- sem algorithm »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
Structural Equation Modeling Algorithm and Its Application in Business Analytics
Published 2017“…This review article algorithmically discussesthe SEM methodology. SEM strategies, SEM steps and SEM stages are introduced in this article; validity tests are presented os well. …”
Get full text
Get full text
Get full text
Book Chapter -
5
An Analytical Algorithm for Delphi Method for Consensus Building and Organizational Productivity
Published 2017“…This review article algorithmically discussesthe SEM methodology. SEM strategies, SEM steps and SEM stages are introduced in this article; validity tests are presented os well. …”
Get full text
Get full text
Get full text
Book Chapter -
6
Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring
Published 2021“…Thus, in this thesis, a new Smart Energy Meter (SEM) with adaptive data transfer algorithm is designed to accommodate the problem. …”
Get full text
Get full text
Thesis -
7
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
8
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Quantitative Analysis And Mapping Of Concrete Scanning Electron Microscope (SEM) Images
Published 2018“…Meanwhile, the subjective visual assessment of the image sample 5 and 6 has confirmed the micro-crack developments on the concrete SEM images upon which the crack density was 3.02 % and 1.30 %, respectively.…”
Get full text
Get full text
Monograph -
10
-
11
-
12
Influences of Cost Factors Affecting Technical Performance of Local Government Projects in Nigeria: A Partial Least Square-Structural Equation Modeling (PLS-SEM) Approach
Published 2016“…A Warp partial least square-structural equation modeling (PLS-SEM) software algorithm was used for the analysis of collected data. …”
Get full text
Get full text
Get full text
Article -
13
-
14
-
15
What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility
Published 2024“…Data were analyzed using Partial Least Squares-Structural Equation Modeling (PLS-SEM) to examine the relationships between variables. …”
Get full text
Get full text
Get full text
Article -
16
Design and develop self-assembly robot hardware, algorithm and software
Published 2023text::Final Year Project -
17
-
18
Let’s collaborate’: Malaysian TVET-engineering institution and industry partnership
Published 2022“…Then, the data were analysed using the PLS-SEM 3.3.9 software via the algorithm, bootstrapping and blindfolding method. …”
Get full text
Get full text
Article -
19
-
20
Capability requirements on fraud prevention in the Nigeria public sector: perception of forensic accountants and auditors
Published 2017“…Three were tested through the use of the PLS-SEM Algorithm and Bootstrapping techniques regarding their internal consistency reliability, convergent validity, discriminant validity, and direct relationships. …”
Get full text
Get full text
Get full text
Thesis
