Search Results - (( development program prevention algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- prevention algorithm »
- development program »
- data normalization »
- java »
-
1
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
5
Classification model for hotspot occurrences using spatial decision tree algorithm
Published 2013“…Developing a predictive model for forest fires occurrence is an important activity in a fire prevention program. …”
Get full text
Get full text
Get full text
Article -
6
Scheduling dynamic cellular manufacturing systems in the presence of cost uncertainty using heuristic method
Published 2016“…It is also found that using appropriate preventive maintenance program can cause up to 75% reduction in cell-load variation. …”
Get full text
Get full text
Thesis -
7
Implementation of Dijkstra Algorithm with React Native to Determine Covid-19 Distribution
Published 2022“…This research implements Dijkstra's Algorithm written in the React Native programming language to build a Covid-19 tracking application. …”
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
Divorce prediction using Naive Bayes / Alia Hannani Ahmad Bakri
Published 2024Get full text
Get full text
Thesis -
10
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Obfuscation (Obfu) is a practice to make the programming code complicated to protect the Intellectual Property (IP) and prevent prohibited software Reverse Engineering (RE). …”
Get full text
Get full text
Thesis -
11
Back propagation neural network approach for churn prediction: a case study in Celcom (M) Berhad / Hapida Husin
Published 2008“…The data has been chunk into a few series to determine the significant variables for predicting churn. Computer program were written in Matlab to implement the training and testing programs for the ANN algorithms. …”
Get full text
Get full text
Thesis -
12
Energy Management System For Controlling Series Hybrid Electric Motorcycle
Published 2016“…Tuning and adaptation of the control algorithm had been demonstrated so developers can make use of them for their applications. …”
Get full text
Get full text
Thesis -
13
Development of a sensor device algorithm and monitoring system for the pin-on-disc (POD) tribometer
Published 2024text::Final Year Project -
14
Methods of intrusion detection in information security incident detection: a comparative study
Published 2018“…This was due to each solution deploy was highly depended with the algorithms reside in the program loaded in the security tools. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Modified firefly algorithm for directional overcurrent relay coordination in power system protection / Muhamad Hatta Hussain
Published 2020“…The objectives of the studies are to develop a new optimization technique termed as Modified Firefly Algorithm (MFA) for minimizing the relay operating time, to develop a Multi-Objective Modified Firefly Algorithm (MOMFA) for minimizing both the total relay operating time and relay coordination time and to develop an integrated optimal predictor termed as Modified Firefly Algorithm-Artificial Neural Network (MFA-ANN) for accurate prediction of relay operating time. …”
Get full text
Get full text
Thesis -
16
Botnet detection using automated script / Norfathin Rosli
Published 2020“…The project is dedicated for Network and Security Analyst to develop better algorithm for botnet detect and prevents. …”
Get full text
Get full text
Thesis -
17
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
18
A new classifier based on combination of genetic programming and support vector machine in solving imbalanced classification problem
Published 2016“…Nevertheless, the optimization task requires specific care in order to prevent the issue of overfitting classification model. …”
Get full text
Get full text
Get full text
Thesis -
19
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
