Search Results - (( development process specialization algorithm ) OR ( java data normalization algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Data Analysis and Machine Learning Algorithms Evaluation for Bioliq AI-based Predictive Tool by Samuel Simbine, Augusto

    Published 2019
    “…This final year project identified relevant parameters through literature research, analysis and expert interview, and evaluated different machine learning algorithms and identified linear regression as the most applicable and efficient with its R-square of 0.8015, qualifying it to be used for the development of a hybrid model for the AI-based tool for predictive process optimization for chemical plants.…”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Using Image Processing Technique in Packaging Decoration by Zhiyuan, Li

    Published 2009
    “…The aim of this thesis is to develop an application for packaging decoration purpose that allow user to apply image processing algorithm onto the decoration image and subsequently paste the decoration image on a flat and curve surface in order the decoration image to be viewed at different angles. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17

    Rule-based filtering algorithm for textual document by Jamil, Nurul Syafidah, Ku-Mahamud, Ku Ruhana, Mohamed Din, Aniza

    Published 2017
    “…Improper filtration might cause terms that have similar meaning to be removed.Thus, to reduce the high-dimensionality of text, this study proposed a filtering algorithm that is able to filter the important terms from the pre-processed text and applied term weighting scheme to solve synonym problem which will help the selection of relevant term.The proposed filtering algorithm utilizes a keyword library that contained special terms which is developed to ensure that important terms are not eliminated during filtration process.The performance of the proposed filtering algorithm is compared with rough set attribute reduction (RSAR) and information retrieval (IR) approaches.From the experiment, the proposed filtering algorithm has outperformed both RSAR and IR in terms of extracted relevant terms.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Graph processing hardware accelerator for shortest path algorithms in nanometer very large-scale integration interconnect routing by Ch'ng, Heng Sun

    Published 2007
    “…This thesis proposes a graph processing hardware accelerator for shortest path algorithms applied in nanometer VLSI interconnect routing problems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Framework development in extracting rules from trained neural network / Shuzlina Abdul Rahman, Azlinah Hj Mohamed and Marina Yusoff by Abdul Rahman, Shuzlina, Mohamed (Hj), Azlinah, Yusoff, Marina

    Published 2006
    “…The analysis is derived by excavating literature on RE techniques starting from the year 1993 until 2003 focused on supervised learning algorithm. The framework primarily demonstrates that each approach does not require a special training process for a new input dataset and does not require special network architecture and it can be used as a guideline to ANNs researcher and developer to choose a suitable RE techniques in order for them to perform ANNs' research or developing ANN applications.…”
    Get full text
    Get full text
    Research Reports
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article