Search Results - (( developing a end algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- end algorithm »
- a end »
- java »
-
1
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…As a result, the system makes the confidential data in SMS text become safer and secure in such case of the device lost or stolen. …”
Get full text
Get full text
Conference or Workshop Item -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
loformation Retrieval - using Porter Stemming Algorithm
Published 2006“…The objective of this project is to develop a system that will demonstrate the information retrieval using Porter Stemming Algorithm. …”
Get full text
Get full text
Final Year Project -
5
On the delay and link utilization with the new-additive increase multiplicative decrease congestion avoidance and control algorithm
Published 2010“…We want to evaluate the effect of using the AIMD algorithm after developing it, which we called the New-AIMD algorithm, to find a new approach to measure the end-to-end delay and bottleneck link utilization and use the NCTUns simulator to obtain the results after making the modification for the mechanism. …”
Get full text
Get full text
Get full text
Article -
6
Development of behavior-based reactive navigation system for mobile robot
Published 2013“…In this work, multiple traps may have many types of shape ranges from a simple obstacle corner, U shape dead ends, snail shape until to a complicated loops and mazes. …”
Get full text
Get full text
Thesis -
7
Cutting temperature and surface roughness optimization in CNC end milling using multi objective genetic algorithm
Published 2012“…Machining of hard materials at high cutting speeds produces high temperatures in the cutting zone, which affects the surface quality. Thus, developing a model for estimating the cutting parameters and optimizing this model to minimize the cutting temperatures and surface roughness becomes utmost important to avoid any damage to the quality surface.This paper presents the development of new models and optimizing these models of machining parameters to minimize the cutting temperature in end milling process by integrating the genetic algorithm (GA) with the statistical approach. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
Compact Convolutional neural network (CNN) based on SincNet for end-to-end motor imagery decoding and analysis
Published 2021“…Recently, due to the popularity of end-to-end deep learning, the applicability of algorithms such as convolutional neural networks (CNN) has been explored to achieve the mentioned tasks. …”
Get full text
Get full text
Get full text
Get full text
Article -
9
The use of people rank technique for data dissemination in opportunistic network
Published 2015“…In this paper, we are going to develop on one of the forwarding algorithm, People Rank algorithm, which is a social-based forwarding algorithm. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
10
Secured agriculture sensor data based on end-to-end encryption using raspberry pi
Published 2025“…Additionally, a benchmarking tool was developed to evaluate and compare the performance of these algorithms in terms of speed, memory, CPU usage, and encryption overhead. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Optimization of micro-end milling process parameters of titanium alloy using non-dominated sorting genetic algorithm
Published 2013“…Finally, non-dominated sorting genetic algorithm-II as evolutionary optimization approach was used for multi-objective optimization of the micro-end milling process. …”
Get full text
Get full text
Thesis -
12
Rao-blackwellized particle filter algorithm integrated with neural network sensor model using laser distance sensor
Published 2023“…Commonly, simultaneous localization and mapping (SLAM) algorithm is developed using high-end sensors. Alternatively, some researchers use low-end sensors due to the lower cost of the robot. …”
Get full text
Get full text
Get full text
Get full text
Article -
13
Delay and energy-aware routing for efficient data collection in wireless sensor networks / Ihsan Ali
Published 2024“…The IDBA-AFW evaluates the fitness of relay nodes based on multiple criteria, such as energy efficiency, throughput, and end-to-end delay. Both Bat Algorithm parameters and AFW parameters are adaptively tuned to balance exploration and exploitation throughout the optimization process. …”
Get full text
Get full text
Get full text
Thesis -
14
Application of response surface methodology coupled with genetic algorithm in the optimization of cutting conditions for surface roughness in end-milling of Inconel 718 using coate...
Published 2007“…This paper presents an efficient method of optimisation of surface roughness in end milling of Inconel 718 using TiAlN coated inserts under dry conditions by coupling response surface methodology (RSM) with genetic algorithm (GA). …”
Get full text
Get full text
Proceeding Paper -
15
Improvement of surface roughness in end milling of Ti6Al4V by coupling RSM with genetic algorithm
Published 2011“…The experimental results indicate that the proposed mathematical models suggested could adequately describe the performance indicators within the limits of the factors that are being investigated. The developed RSM is coupled as a fitness function with genetic algorithm to predict the optimum cutting conditions leading to the least surface roughness value. …”
Get full text
Get full text
Get full text
Article -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
Performance enhancement of AIMD algorithm for congestion avoidance and control
Published 2011“…National Chiao Tung University’s network simulation (NCTUns) has been used in this development to compare the new algorithm with the older versions and determine its advantages over the older versions. …”
Get full text
Get full text
Thesis -
18
Prediction and investigation of surface response in high speed end milling of Ti-6Al-4V and optimization by genetic algorithm
Published 2010“…The model can be used for the analysis and prediction of the complex relationship between cutting conditions and the surface roughness in flat end milling of Ti-6Al-4V materials. The developed quadratic prediction model on surface roughness was coupled with the genetic algorithm to optimize the cutting parameters for the minimum surface roughness.…”
Get full text
Get full text
Get full text
Article -
19
-
20
