Search Results - (( java adaptation optimization algorithm ) OR ( making using normalization algorithm ))

Refine Results
  1. 1
  2. 2

    An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma by Sani , Danjuma

    Published 2017
    “…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Improved normalization and standardization techniques for higher purity in K-means clustering by Dalatu, Paul Inuwa, Fitrianto, Anwar, Mustapha, Aida

    Published 2016
    “…Based on its simplicity, the K-means algorithm has been used in many fields. This paper proposes improved normalization and standardization techniques for higher purity in K-means clustering experimented with benchmark datasets from UCI machine learning repository and it was found that all the proposed techniques’ performance was much higher compared to the conventional K-means and the three classic transformations, and it is evidently shown by purity and Rand index accuracy results.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…In order to make the normal people can cluster their data easily, this project aims is to develop a web-based clustering tool that can be used by all peoples. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Artificial neural network-salp-swarm algorithm for stock price prediction by Zuriani, Mustaffa, Mohd Herwan, Sulaiman, Azlan, Abdul Aziz

    Published 2024
    “…Before training, the dataset is normalized using the min-max normalization technique to reduce the influence of noise. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Taguchi?s T-method with Normalization-Based Binary Bat Algorithm by Marlan Z.M., Jamaludin K.R., Harudin N.

    Published 2025
    “…Specifically, a normalization-based Binary Bat algorithm is used, where discretization of continuous solution into binary form is performed using a normalization equation. …”
    Conference paper
  7. 7

    Scheduling scientific workflow in multi-cloud: a multi-objective minimum weight optimization decision-making approach by Farid, Mazen, Heng, Siong Lim, Chin, Poo Lee, Latip, Rohaya

    Published 2023
    “…We compare our proposed method to five distinct decision-making procedures using common scientific workflows with competing objectives: Pareto dominance, multi-criteria decision-making (MCDM), linear normalization I, linear normalization II, and weighted aggregated sum product assessment (WASPAS). …”
    Get full text
    Get full text
    Article
  8. 8

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
    Get full text
    Get full text
    Thesis
  9. 9

    Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys by Nejad, Farshid Hossein, Sabah, Saman, Jam, Amid Jamshidi

    Published 2014
    “…The parameters of the dynamic S-Box have features equivalent to those in the normal algorithm AES. Static S-Box allows attackers to study S-Box and discover weak issues while by using dynamic S-Box approach, it makes difficult and more complex for attacker to do any offline study of an attack of one particular set of S- boxes. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    A Comparative Study of Z-Score and Min-Max Normalization for Rainfall Classification in Pekanbaru by Rahmad Ramadhan, Laska, Anne Mudya, Yolanda

    Published 2024
    “…The findings demonstrate that applying normalization techniques effectively enhances classification performance compared to using unnormalized data. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Smart diagnosis of long bone tumor / Mazni Parimin by Parimin, Mazni

    Published 2005
    “…Here, backpropagation training algorithm will be used and network parameters will be set. …”
    Get full text
    Get full text
    Student Project
  13. 13

    The Impact of Normalization Techniques on Performance Backpropagation Networks by Norlida, Hassan

    Published 2004
    “…This study explored several normalization techniques using backpropagation learning. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud by Shariff, S. Sarifah Radiah, Hud, Hady

    Published 2023
    “…Secondly, in solving every Machine Learning problem, there is no one algorithm superior to other algorithms. Every algorithm makes its own respective prior assumptions about the relationships between the features and target variables, which create different types and levels of bias. …”
    Get full text
    Get full text
    Book Section
  15. 15

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…One of the important assumptions of the linear model is that the error terms are normally distributed. Unfortunately, many researchers are not aware that the performance of the OLS can be very poor when the data set that one often makes a normal assumption, has a heavy-tailed distribution which may arise as a result of the presence of outliers. …”
    Get full text
    Get full text
    Thesis
  16. 16

    An improved image steganography algorithm based on PVD by Bhuiyan, Sharif Shah Newaj, Abdul Malek, Norun, Khalifa, Othman Omran, Abdul Rahman, Farah Diyana

    Published 2018
    “…In this paper, a modification of PVD (Pixel Value Differencing) algorithm is used for Image Steganography in spatial domain. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Stroke-to-stroke matching in on-line signature verification by Ahmad Jaini, Azhar

    Published 2010
    “…The aim of this research is to develop a new approach to map the strokes in both test and reference signatures as well as to verify the originality of the test signatures. Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Dynamic robust bootstrap method based on LTS estimators by Midi, Habshah, Uraibi, Hassan Sami, Al-Talib, Bashar Abdul Aziz Majeed

    Published 2009
    “…Nevertheless, in real situations, many estimates are not normal and the use of bootstrap method is more appropriate as it does not rely on the normality assumption. …”
    Get full text
    Get full text
    Article
  19. 19

    Adaptive interference canceller using analog algorithm with offset voltage by Mohammed, Alaa Hadi

    Published 2015
    “…The experimental tests of the proposed algorithm have shown that the reduction percentage in the MSE output using the proposed algorithm is 51% compared to the NLMS algorithm and 61% compared to the RLS algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Data mining in network traffic using fuzzy clustering by Mohamad, Shamsul

    Published 2003
    “…The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
    Get full text
    Get full text
    Thesis