Search Results - (( developing a relation algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- relation algorithm »
- data normalization »
- a relation »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
5
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
6
Development of symbolic algorithms for certain algebraic processes
Published 2007Get full text
Get full text
Get full text
Monograph -
7
-
8
Bats echolocation-inspired algorithms for global optimisation problems
Published 2016“…The algorithm is a hybrid algorithm that operates using dual level search strategy that takes merits of a particle swarm optimisation algorithm and a modified adaptive bats sonar algorithm. …”
Get full text
Get full text
Thesis -
9
Development of Simulated Annealing Based Scheduling Algorithm for Two Machines Flow Shop Problem
Published 2015“…It is expected that the developed algorithm will perform well if not a par with Johnson’s algorithm…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
Enhance key generation algorithm based user string identity as public key
Published 2015“…This study aims to enhance a previous algorithm called the Tripathi algorithm. …”
Get full text
Get full text
Thesis -
12
Screen-related dependency in children: algorithm for referral from primary care in Malaysia
Published 2025“…While there are general guidelines, i.e., limiting screen time by WHO, there are not yet any specific outlines or pathways provided for healthcare providers at the primary care level, especially in the Malaysian context. This algorithm was developed by a group of Malaysian experts for primary care, aiming to facilitate the early screening of screen-related dependency in pre-school children and its referral for psychological interventions. …”
Get full text
Get full text
Get full text
Article -
13
Comprehensive review of the development of the harmony search algorithm and its applications
Published 2019“…This paper presents a comprehensive overview of the development of the harmony search (HS) algorithm and its applications. …”
Get full text
Get full text
Get full text
Article -
14
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Enhanced ontology-based text classification algorithm for structurally organized documents
Published 2015“…These algorithms represent documents in a space where every word is assumed to be a dimension. …”
Get full text
Get full text
Get full text
Thesis -
16
Relative motion guidance, navigation and control for autonomous spacecraft rendezvous
Published 2011“…These algorithms are used to approach, flyaround, and to depart form a target vehicle in elliptic orbits. …”
Get full text
Get full text
Get full text
Proceeding Paper -
17
Energy efficiency of the bitcoin mining hardware and related blockchain technology
Published 2018“…Developers of bitcoin hardware systems and bitcoin miners are the possible users of proposed formula and algorithm.…”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
18
Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja
Published 2004“…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
Get full text
Get full text
Thesis -
19
Hand gesture recognition in ASD related motion using YOLOv8 algorithm / Muhammad Afiq Mohd Ali
Published 2025“…The study focuses on designing a Hand Gesture Recognition application by means of the YOLOv8 deep learning algorithm to recognize hand gestures associated with autism spectrum disorder (ASD). …”
Get full text
Get full text
Thesis -
20
Ensemble Dual Recursive Learning Algorithms for Identifying Custom Tanks Flow with Leakage
Published 2010“…This paper proposed that, combination of two algorithms into one learning algorithm for predicting mass flow rate of a flow with leakage resulting in a better mass prediction error as compared to a model with single learning algorithm.…”
Get full text
Get full text
Conference or Workshop Item
