Search Results - (( developing a sem algorithm ) OR ( java data normalization algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Structural Equation Modeling Algorithm and Its Application in Business Analytics by Sorooshian, Shahryar

    Published 2017
    “…This review article algorithmically discussesthe SEM methodology. SEM strategies, SEM steps and SEM stages are introduced in this article; validity tests are presented os well. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  5. 5

    An Analytical Algorithm for Delphi Method for Consensus Building and Organizational Productivity by Abd Hamid, Zahidy, Noor Azlinna, Azizan, Sorooshian, Shahryar

    Published 2017
    “…This review article algorithmically discussesthe SEM methodology. SEM strategies, SEM steps and SEM stages are introduced in this article; validity tests are presented os well. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  6. 6

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…Thus, in this thesis, a new Smart Energy Meter (SEM) with adaptive data transfer algorithm is designed to accommodate the problem. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Quantitative Analysis And Mapping Of Concrete Scanning Electron Microscope (SEM) Images by Maizul, Elly Nur Myaisara

    Published 2018
    “…Meanwhile, the subjective visual assessment of the image sample 5 and 6 has confirmed the micro-crack developments on the concrete SEM images upon which the crack density was 3.02 % and 1.30 %, respectively.…”
    Get full text
    Get full text
    Monograph
  9. 9

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Influences of Cost Factors Affecting Technical Performance of Local Government Projects in Nigeria: A Partial Least Square-Structural Equation Modeling (PLS-SEM) Approach by Gambo, Nuru, Said, Ilias, Ismail, Radzi

    Published 2016
    “… The technical performance requirements of projects posed a challenge to the sustainable development of small size local government projects particularly in developing countries. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    What drives Chinese youth to use fitness-related health information on social media? an analysis of intrinsic needs, social media algorithms, and source credibility by Zhang, Xin, Tang, Qing Qing, Cai, Ying Ying

    Published 2024
    “…This study aims to address this gap by integrating Self-Determination Theory (SDT)-based internal factors and external factors (social media algorithms and source credibility). Methods: A voluntary sample of 600 participants, aged 15 to 29, was recruited. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Let’s collaborate’: Malaysian TVET-engineering institution and industry partnership by U. S., Subri, N. E., Sohimi, H. M., Affandi, S. M., Noor, F. A. N, Yunus

    Published 2022
    “…Then, the data were analysed using the PLS-SEM 3.3.9 software via the algorithm, bootstrapping and blindfolding method. …”
    Get full text
    Get full text
    Article
  20. 20

    A real-time image dynamic range compensation for scanning electron microscope imaging system by Kamel , Nidal

    Published 2005
    “…This paper presents the development and implementation of a real-time dynamic range compensation system for scanning electron microscope (SEM) imaging applications. …”
    Get full text
    Get full text
    Get full text
    Citation Index Journal