Search Results - (( developing formative identification algorithm ) OR ( java data normalization algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    A New Cell Formation Method Considering Operation Sequences And Production Volumes by Abedini, Panteha

    Published 2013
    “…This research, presents an algorithm for cell formation to minimize intercellular movements. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  6. 6

    In silico approaches for unearthing bacterial quorum-sensing inhibitors against pathogenic bacteria by Pawar, Shrikant, Bramha Chari, P. V., Lahiri, Chandrajit *

    Published 2019
    “…Thus, certain group of researchers also developed machine learning tools based on support vector machine (SVM) and hidden Markov models (HMM) for the identification of novel and effective biofilm inhibitory peptides (BIPs), while others used in silico approaches for predicting and designing of antibiofilm peptides usingbidirectional recursive neural network (BRNN) and Random Forest (RF) algorithms. …”
    Get full text
    Get full text
    Book Section
  7. 7

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    HUMAN MOOD DETECTOR BY USING DIGITAL IMAGE PROCESSING by ALI, NOORAZLIN

    Published 2006
    “…These distinct criteria will he used to develop an algorithm that differentiates all the three emotions described before. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    Estimating the optimal threshold value for foreign investment in Malaysia / Noorzahirah Mohd Sidek and Mahadzir Ismail by Mohd Sidek, Noorzahirah, Ismail, Mahadzir

    Published 2012
    “…The final outcome of this study is the formation of a generic theoretical model which is applicable, at least, in developing countries. …”
    Get full text
    Get full text
    Research Reports
  10. 10

    Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment by Ahmed Hamza, Manar, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, S. Alotaibi, Saud, Mahgoub, Hany, S. Mehanna, Amal, Motwakel, Abdelwahed

    Published 2022
    “…At first, data pre-processing is performed to convert the actual data into useful format. In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Investment, trade and exchange rates / Noor Zahirah Mohd Sidek and Mahadzir Ismail by Mohd Sidek, Noor Zahirah, Ismail, Mahadzir

    Published 2012
    “…The final outcome of this study is the formation of a generic theoretical model which is applicable, at least, in developing countries.…”
    Get full text
    Get full text
    Research Reports
  12. 12

    Development of a Production Planning and Control Software in Total Productivity Maintenance Environment by Lee, Pang Seng

    Published 2004
    “…A TPM based software program has been developed to ease the process of production planning and control in TPM environment by executing sequential methodology such as problem identification, literature review, problem formulation, data coliection, company operation review, flow chart system and program algorithm before test run in the company. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Lightning peak current estimation using a system identification approach by Wern T.L.T., Mukerjee R.N.

    Published 2023
    “…A system identification-based lightning peak current estimation algorithm using upper-air radiosonde observations is developed. …”
    Article
  14. 14

    A hybrid of fuzzy c-means clustering and Latent Dirichlet Allocation for analysing philanthropic corporate social responsibility activities / Nik Siti Madihah Nik Mangsor by Nik Mangsor, Nik Siti Madihah

    Published 2023
    “…The analysis involved five-year data from the annual reports of 19 CSR-award winning companies in Malaysia where they were converted into a structured format, collated and summarized. Then, text pre-processing for data cleaning was performed followed by identification of the best Latent Dirichlet Allocation (LDA) topic modelling technique that was used to integrate document clustering.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Zero distortion-based steganography for handwritten signature by Iranmanesh, Vahab

    Published 2018
    “…Thus, developing a steganographic algorithm to use cover media (c) without raising attention is the most challenging task in data hiding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Safety Analysis Of Unsignalized Intersections Under Erroneous Road Crash Data Influence by Ahmed, Ashar

    Published 2016
    “…This parameter was utilized in the model formation along with gap acceptance and vehicle type to estimate the probability of serious conflict. …”
    Get full text
    Get full text
    Thesis