Search Results - (( development a normalization algorithm ) OR ( java data function algorithm ))
Search alternatives:
- normalization algorithm »
- function algorithm »
- a normalization »
- development a »
- data function »
- java »
-
1
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…J2ME phone and Symbian Operating System (OS) as the platform for the application to run. The encryption algorithm that implemented in the system is Advanced Encryption Standard (AES) with 128-bit block size and together with the SHA1 (Secure Hash Algorithm) hash functions. …”
Get full text
Get full text
Conference or Workshop Item -
2
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
3
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
6
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
Get full text
Get full text
Get full text
Article -
7
Algorithm for calculation of cephalometric soft tissue facial traits
Published 2007“…This paper presents development of a new soft tissue analysis algorithm, which will be used as an analysis tool in Computer Assisted Craniofacial Surgery Planner – a surgery planning system under development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Towards the utilization of normalized LMS algorithm in adaptive filter
Published 2014“…In this paper, we focused on how the development of algorithms helped reduce the level of noise. …”
Get full text
Get full text
Get full text
Article -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…In order to make the normal people can cluster their data easily, this project aims is to develop a web-based clustering tool that can be used by all peoples. …”
Get full text
Get full text
Thesis -
10
Semi-automatic cortical boundary detection / Noor Elaiza Abdul Khalid.
Published 2010“…For this purpose, two algorithm are has been developed to automatically detect the OC and IC. …”
Get full text
Get full text
Thesis -
11
-
12
The normalized random map of gradient for generating multifocus image fusion
Published 2020“…In order to handle this problem, the proposed method a concise algorithm which is able to generate an accurate fused image without using a complicated mathematical equation and tough algorithm. …”
Get full text
Get full text
Get full text
Article -
13
Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop
Published 2016“…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
Get full text
Get full text
Thesis -
14
Hardware Simulator for Seizure, Preseizure and Normal Mode Signal Generation in LabVIEW Environment for Research
Published 2013“…Thispaper will enhance the purpose of developing a system which can alert locally in a form of wearable gadget, whenever a pre-seizure occurs. …”
Get full text
Get full text
Get full text
Non-Citation Index Journal -
15
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…Specifically, a normalization-based Binary Bat algorithm is used, where discretization of continuous solution into binary form is performed using a normalization equation. …”
Conference paper -
16
Smart student timetable planner
Published 2025“…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
A new method for intermediate power point tracking for PV generator under partially shaded conditions in hybrid system
Published 2018“…This technique is based on the combination of two algorithms, the particle swarm optimization algorithm for tracking the global maximum power point, while a newly developed algorithm is used for attaining any other supervisory control set point. …”
Get full text
Get full text
Article -
18
Application of Technology Acceptance Model on Database Normalizer
Published 2011“…The main objective of this study is to develop a database normalizer application to normalize the database tables up to the third normal form (3NF). …”
Get full text
Get full text
Get full text
Thesis -
19
Multi-sources model and control algorithm of an energy management system
Published 2012“…The developed control strategies continuously support the EMS of the multiple sources of energy for a scooter under normal and heavy power load conditions. …”
Get full text
Get full text
Article -
20
DEVELOPMENT OF IRIS RECOGNITION SYSTEM
Published 2016“…The “objective of this” project “is to develop” a secure “iris recognition” algorithm for identification management and access control. …”
Get full text
Get full text
Final Year Project
