Search Results - (( its implementation cell algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- implementation cell »
- its implementation »
- data normalization »
- cell algorithm »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell
Published 2008“…This thesis presents a collision detection algorithm for accurate simulation of a virtual flexible manufacturing cell. …”
Get full text
Get full text
Thesis -
4
Inter-cell and intra-cell facility layout models under different demand environments in cellular manufacturing systems
Published 2012“…The model minimizes both inter-cell and intra-cell material handling cost. To solve the model, an algorithm based on Simulated Annealing (SA) is developed in C/C++ namely SA1. …”
Get full text
Get full text
Thesis -
5
Reduced Galloping Column Algorithm For Memory Testing
Published 2015“…However, the existing GalCol algorithm takes huge test time due to its test complexity. …”
Get full text
Get full text
Thesis -
6
Image segmentation based on normalised cuts with clustering algorithm
Published 2013“…This can be done by performing the normalised cuts algorithm in hierarchical manner in which the image is divided into image cells where local segmentation is performed on each of the image cells. …”
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
8
-
9
Modelling Of A New Fully Hybrid Spectrum Sharing Approach Fifth Generation Cellular Operators
Published 2020“…More precisely, the mmWave cell–carrier distribution strategy was implemented by setting up a tolerable distance among the mmWave cells (mCells) that operate at the same band (28 or 73 GHz) which are adopted in this work. …”
Get full text
Get full text
Get full text
Thesis -
10
-
11
An efficient cache replacement algorithm for minimizing the error rate in L2-STT-MRAM caches
Published 2017“…The performance analysis of the proposed algorithm ensures its effectiveness in reducing the error rate and cost overheads as compared to the conventional LRU technique implemented on SRAM cells.…”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…Each PV module has its own optimum point at which the power delivered from the PV is at its maximum value. …”
Get full text
Get full text
Thesis -
13
FPGA based Twofish Algorithm
Published 2009“…This paper presents the architecture of Twofish algorithm implemented with field programmable gate array (FPGA). …”
Get full text
Working Paper -
14
Efficiency improvement of a standalone photovoltaic system using fuzzy-based maximum power point tracking algorithm
Published 2016“…Among the conventional techniques, perturb and observe (P&O) is the most common method due to its simplicity of operation and easiness of implementation. …”
Get full text
Get full text
Thesis -
15
Lithium-ion battery charge equalization algorithm for electric vehicle applications
Published 2023Conference Paper -
16
Photovoltaic-based single-ended primary-inductor converter with dual-fuzzy logic control-based maximum power point tracking
Published 2016“…In this work, FLC was selected because it is easy to be implemented and does not require mathematical model in its design. …”
Get full text
Get full text
Thesis -
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
18
Asic design of a kohonen neural network microchip
Published 2004“…This paper discusses the Kohonen neural network (KNN) processor and its KNN computation engine microchip. The ASIC design of the KNN processor adopts a novel implementation approach whereby the computation of the KNN algorithm is performed on the custom ASIC microchip and its operations are governed by a FPGA based controller. …”
Get full text
Get full text
Get full text
Book Section -
19
Charging and discharging control of Li-Ion battery energy management for Electric vehicle application
Published 2023“…Backtracking search optimization algorithm (BSA) is implemented to optimize the parameters for generating regulated PWM signal. …”
Article -
20
Klasifikasi Sel-Sel Kanser Payudara Menggunakan Rangkaian Neural Peta-Peta Penubuhan-Diri (Som)
Published 2006“…New innovation in neural network methods which have become popular and its application in medical field have enabled prediction of the cancer cells easier. …”
Get full text
Get full text
Monograph
