Search Results - (( java application customization algorithm ) OR ( making using normalization algorithm ))
Search alternatives:
- customization algorithm »
- normalization algorithm »
- java application »
- making using »
-
1
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
Get full text
Get full text
Get full text
Thesis -
2
Improved normalization and standardization techniques for higher purity in K-means clustering
Published 2016“…Based on its simplicity, the K-means algorithm has been used in many fields. This paper proposes improved normalization and standardization techniques for higher purity in K-means clustering experimented with benchmark datasets from UCI machine learning repository and it was found that all the proposed techniques’ performance was much higher compared to the conventional K-means and the three classic transformations, and it is evidently shown by purity and Rand index accuracy results.…”
Get full text
Get full text
Get full text
Article -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…In order to make the normal people can cluster their data easily, this project aims is to develop a web-based clustering tool that can be used by all peoples. …”
Get full text
Get full text
Thesis -
4
Artificial neural network-salp-swarm algorithm for stock price prediction
Published 2024“…Before training, the dataset is normalized using the min-max normalization technique to reduce the influence of noise. …”
Get full text
Get full text
Get full text
Article -
5
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…Specifically, a normalization-based Binary Bat algorithm is used, where discretization of continuous solution into binary form is performed using a normalization equation. …”
Conference paper -
6
Scheduling scientific workflow in multi-cloud: a multi-objective minimum weight optimization decision-making approach
Published 2023“…We compare our proposed method to five distinct decision-making procedures using common scientific workflows with competing objectives: Pareto dominance, multi-criteria decision-making (MCDM), linear normalization I, linear normalization II, and weighted aggregated sum product assessment (WASPAS). …”
Get full text
Get full text
Article -
7
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…This algorithm was minimal in line code to make it lightweight and made use of the controller's functionality without adding extra computational burden on the controller.…”
Get full text
Get full text
Thesis -
8
Analysis of avalanche effect on advance encryption standard by using dynamic S-Box depends on rounds keys
Published 2014“…The parameters of the dynamic S-Box have features equivalent to those in the normal algorithm AES. Static S-Box allows attackers to study S-Box and discover weak issues while by using dynamic S-Box approach, it makes difficult and more complex for attacker to do any offline study of an attack of one particular set of S- boxes. …”
Get full text
Get full text
Conference or Workshop Item -
9
A Comparative Study of Z-Score and Min-Max Normalization for Rainfall Classification in Pekanbaru
Published 2024“…The findings demonstrate that applying normalization techniques effectively enhances classification performance compared to using unnormalized data. …”
Get full text
Get full text
Get full text
Article -
10
-
11
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
12
Smart diagnosis of long bone tumor / Mazni Parimin
Published 2005“…Here, backpropagation training algorithm will be used and network parameters will be set. …”
Get full text
Get full text
Student Project -
13
The Impact of Normalization Techniques on Performance Backpropagation Networks
Published 2004“…This study explored several normalization techniques using backpropagation learning. …”
Get full text
Get full text
Get full text
Thesis -
14
Using predictive analytics to solve a newsvendor problem / S. Sarifah Radiah Shariff and Hady Hud
Published 2023“…Secondly, in solving every Machine Learning problem, there is no one algorithm superior to other algorithms. Every algorithm makes its own respective prior assumptions about the relationships between the features and target variables, which create different types and levels of bias. …”
Get full text
Get full text
Book Section -
15
Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares
Published 2009“…One of the important assumptions of the linear model is that the error terms are normally distributed. Unfortunately, many researchers are not aware that the performance of the OLS can be very poor when the data set that one often makes a normal assumption, has a heavy-tailed distribution which may arise as a result of the presence of outliers. …”
Get full text
Get full text
Thesis -
16
An improved image steganography algorithm based on PVD
Published 2018“…In this paper, a modification of PVD (Pixel Value Differencing) algorithm is used for Image Steganography in spatial domain. …”
Get full text
Get full text
Get full text
Get full text
Article -
17
Stroke-to-stroke matching in on-line signature verification
Published 2010“…The aim of this research is to develop a new approach to map the strokes in both test and reference signatures as well as to verify the originality of the test signatures. Current methods make use of the DTW algorithm and its variant to segment them before comparing each of its data dimension. …”
Get full text
Get full text
Thesis -
18
Dynamic robust bootstrap method based on LTS estimators
Published 2009“…Nevertheless, in real situations, many estimates are not normal and the use of bootstrap method is more appropriate as it does not rely on the normality assumption. …”
Get full text
Get full text
Article -
19
Adaptive interference canceller using analog algorithm with offset voltage
Published 2015“…The experimental tests of the proposed algorithm have shown that the reduction percentage in the MSE output using the proposed algorithm is 51% compared to the NLMS algorithm and 61% compared to the RLS algorithm. …”
Get full text
Get full text
Thesis -
20
Data mining in network traffic using fuzzy clustering
Published 2003“…The fuzzy clustering process are made using three algorithms : Fuzzy C-Means (FCM), Gustafsof-Kessel (GK) and Gath-Geva (GG) algorithm. …”
Get full text
Get full text
Thesis
