Search Results - (( developing data normalization algorithm ) OR ( based applications using algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- based applications »
- applications using »
- developing data »
- using algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…In order to make the normal people can cluster their data easily, this project aims is to develop a web-based clustering tool that can be used by all peoples. …”
Get full text
Get full text
Thesis -
2
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
3
The effect of dose calculation algorithms on the normal tissue complication probability values of thoracic cancer
Published 2015“…Purpose: To identify the effect of dose calculation algorithms on the Normal Tissue Complication Probability values of thoracic cancer. …”
Get full text
Get full text
Monograph -
4
Stroke-to-stroke matching in on-line signature verification
Published 2010“…Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
5
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution: article / Nor Azura Ayop
Published 2016“…The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Article -
6
-
7
Fault diagnostic algorithm for precut fractionation column
Published 2004“…The fault diagnostic algorithm is supported by the process history based method and developed by using Borland C++ Builder 6.0. …”
Get full text
Get full text
Conference or Workshop Item -
8
Monitoring the impacts of drought on land use/cover: a developed object-based algorithm for NOAA AVHRR time series data
Published 2011“…As a novel idea in this study, it developed a new object-based classification algorithm for AVHRR (Advanced Very High Resolution Radiometer) data. …”
Get full text
Get full text
Get full text
Article -
9
Application of Evolutionary Algorithm for Assisted History Matching
Published 2014“…Today, tremendous efforts are made to develop Automatic History Matching algorithms. While the automatic method focus on optimization which is normally computer based. …”
Get full text
Get full text
Final Year Project -
10
Prediction of Total Suspended Sediments in Penang Waters Using Remote Sensing
Published 2004“…Out of the six algorithms derived, Algorithm 6 showed the best correlation with the ground-truth data (R2 value of 0.9755 and RMSE value of 4.0107). …”
Get full text
Get full text
Thesis -
11
Neighbour-based on-demand routing algorithms for mobile ad hoc networks
Published 2017“…In terms of the applications, The DCFP is more suitable to be used for education applications, while the SNBR is a good algorithm designed to be used for rescue system as data and energy is the main concern. …”
Get full text
Get full text
Get full text
Thesis -
12
Spectral discrimination and index development of roofing materials and conditions using field spectroscopy and worldview-3 satellite image
Published 2016“…Generally, the highest accuracy is produced using RF feature selection (97.53%), hence, describe the efficiency of RF algorithm for feature selection task using field spectroscopy data. …”
Get full text
Get full text
Thesis -
13
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…We modified the classical bootstrapping algorithm by developing a mechanism based on the robust LTS method to detect the correct number of outliers in the each bootstrap sample. …”
Get full text
Get full text
Thesis -
14
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…The proposed model is tested for small and large size grid data, integrated with photovoltaic sources under normal and fluctuating load demand conditions and seasonal variations. …”
Get full text
Get full text
Thesis -
15
Development of intrusion detection system using residual feedforward neural network algorithm
Published 2022“…This detection system must differentiate between normal data and abnormal or hacker-generated data. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Taguchi's method for optimized neural network based autoreclosure in extra high voltage lines
Published 2008“…The developed algorithm is verified with dedicated testing data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Data mining in network traffic using fuzzy clustering
Published 2003“…In this project, I have developed a program to capture and filter the packets based on the application. The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
Get full text
Get full text
Thesis -
18
Data mining in network traffic using fuzzy clustering
Published 2003“…In this project, I have developed a program to capture and filter the packets based on the application. The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
Get full text
Get full text
Thesis -
19
Realization Of The 1D Local Binary Pattern (LBP) Algorithm In Raspberry Pi For Iris Classification Using K-NN Classifier
Published 2018“…Firstly, the 1D-LBP algorithm is used to extract the features of the normalized iris images and save the data in a text file according to the subject and the combinations to evaluate for the next stage. …”
Get full text
Get full text
Monograph -
20
Autoreclosure in Extra High Voltage Lines using Taguchi’s Method and Optimized Neural Networks
Published 2008“…The developed algorithm is effectively trained, verified and validated with a set of training, dedicated testing and validation data respectively.…”
Get full text
Get full text
Conference or Workshop Item
