Search Results - (( developing scale selection algorithm ) OR ( java data function algorithm ))
Search alternatives:
- selection algorithm »
- function algorithm »
- developing scale »
- scale selection »
- data function »
- java »
-
1
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
3
Sizing optimization of large-scale grid connected photovoltaic system using dolphin echolocation algorithm / Muhammad Zakyizzuddin Rosselan
Published 2018“…Before incorporating the optimization methods, a sizing algorithm for large-scale GCPV systems was developed. …”
Get full text
Get full text
Thesis -
4
Common spatial pattern with feature scaling (FSc-CSP) for motor imagery classification
Published 2017“…In this paper, we propose an algorithm called Feature Scaling Common Spatial Pattern (FSc-CSP) to overcome the problem of feature selection. …”
Get full text
Get full text
Article -
5
An Efficient Genetic Algorithm for Large Scale Vehicle Routing Problem Subject to Precedence Constraints
Published 2015“…Therefore, it can be stated that the genetic algorithm approach developed in this study is efficient in solving large scale vehicle routing problem subject to precedence constraints with the objective of minimizing the distance travelled.…”
Get full text
Get full text
Get full text
Article -
6
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
Published 2015“…In order to make our proposed method cost efficient, we developed Load Aware Over Cost algorithm which is 8% cost effective comparing with Load Aware algorithm. …”
Get full text
Get full text
Thesis -
8
-
9
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
10
Facial features point localization using modified SIFT scale space / Zulfikri Paidi
Published 2020“…The issue mentioned requires a new action to resolve it. This study aimed to develop a new algorithm in the form of hybrids when the scaling technique in SIFT was integrated with another technique. …”
Get full text
Get full text
Thesis -
11
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
12
Not seeing the forest for the trees: Generalised linear model out-performs random forest in species distribution modelling for Southeast Asian felids
Published 2023“…Our results have strong implications for SDM development, revealing the inconsistencies introduced by the choice of algorithm on scale optimisation, with GLM selecting broader scales than RF.…”
Get full text
Get full text
Article -
13
A Study On Gene Selection And Classification Algorithms For Classification Of Microarray Gene Expression Data
Published 2005“…The Development Of Microarray Technology Allows Researchers To Monitor The Expression Of Genes On A Genomic Scale. …”
Get full text
Get full text
Get full text
Article -
14
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…We modified the classical bootstrapping algorithm by developing a mechanism based on the robust LTS method to detect the correct number of outliers in the each bootstrap sample. …”
Get full text
Get full text
Thesis -
15
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
Toxic Gas Dispersion Model Based On Neural Pattern Recognition Networks
Published 2022“…To achieve the objectives, two phases of structure architecture of NPR is carried out. First, NPR development is developed using three different algorithms which are Levenberg-Marquart (LM), Bayesian Regularization (BR) and Scaled Conjugated Gradient (SCG) to propose the best network algorithm using 70% training and 10-28 hidden neurons. …”
Get full text
Get full text
Monograph -
18
Optimization of RFID network planning for monitoring railway mechanical defects based on gradient-based Cuckoo search algorithm
Published 2020“…In the large-scale area application, the GBCS algorithm achieved 100%, 93.75%, and 98.9% coverage for Maluri, Subang, and TBS stations, respectively. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Efficient genetic partitioning-around-medoid algorithm for clustering
Published 2019“…The first set showed the efficiency and performance of the proposed composing techniques including: kmean++ algorithm for initialization, fitness scaling for fitness selection, the proposed split and merge mutation operator, and choosing the medoid instead of the mean as a centroid-selection schema. …”
Get full text
Get full text
Thesis -
20
Development of artificial neural network models for predicting lipid profile using smartMF electrical parameters / Ahmad Zulkhairi Zulkefli
Published 2021“…For TG, the LM algorithm with a testing accuracy of 76.7%, sensitivity of 28.6% and specificity of 91.3% was selected. …”
Get full text
Get full text
Get full text
Thesis
