Search Results - (( developing animation identification algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- animation identification »
- identification algorithm »
- normalization algorithm »
- developing animation »
- data normalization »
- java »
-
1
Animal voice recognition for identification (ID) detection system
Published 2011“…Voice recognition systems have become the important applications for speech recognition technology. In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
2
Dog voice identification (ID) for detection system
Published 2012“…Voice recognition systems have become the important applications for speech recognition technology. In this paper, an animal identification (ID) detection system based on animal voice pattern recognition algorithm has been developed. …”
Get full text
Get full text
Conference or Workshop Item -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
4
-
5
-
6
-
7
-
8
-
9
-
10
-
11
-
12
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Rabbit breed classification using CNN / Aishah Nabila Mohd Zaid
Published 2024“…This study underscores the CNN algorithm's viability for accurate rabbit breed identification. …”
Get full text
Get full text
Thesis -
15
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
An approach to enhance the structural operational deflection shape under random ambient excitation through mode shape expansion / Muhamad Azhan Anuar
Published 2021“…The implementation of this study involves systematic methodology; (i) Operational Modal Analysis (OMA) as an experimental method – The experimental data were collected and processed in order to decompose the signal into modal components using different algorithms to obtain reliable experimental modal data (ii) Finite Element (FE) as numerical technique – FE model was developed, and normal modes results were obtained. …”
Get full text
Get full text
Thesis
