Search Results - (( java data normalization algorithm ) OR ( based contact method algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- method algorithm »
- based contact »
- java »
-
1
Kinematic contact-impact algorithm with friction
Published 2001“…Node-node and node-element contacts are formulated. The algorithm includes a novel method forhandling potential voids and overlaps at contact intersection. …”
Get full text
Get full text
Article -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
5
Automatic algorithm applied for calculating thermal conductivity by transient plane source method
Published 2024“…To address this issue, an automatic algorithm based on the international standard (ISO22007-2:2008) is proposed in this paper. …”
Get full text
Get full text
Get full text
Article -
6
-
7
Prediction analysis of COVID-19 in Selangor by using Backpropagation Algorithm with Conjugate Gradient Method
Published 2024“…The Fletcher-Reeves approach can improve the efficiency of the backpropagation algorithm by having a faster convergence rate than other methods such as the scaled conjugate gradient method. …”
Get full text
Get full text
Get full text
Article -
8
Prediction analysis of COVID-19 in Selangor by using backpropagation algorithm with conjugate gradient method
Published 2024“…The Fletcher-Reeves approach can improve the efficiency of the backpropagation algorithm by having a faster convergence rate than other methods such as the scaled conjugate gradient method. …”
Get full text
Get full text
Get full text
Article -
9
Contact stress analysis for gears of different helix angle using finite element method
Published 2014“…The Lagrange multiplier algorithm has been used between the contacting pairs to determine the stresses. …”
Get full text
Get full text
Conference or Workshop Item -
10
Contact stress evaluation of involute gear pairs, including the effects of friction and helix angle
Published 2015“…In this paper, three-dimensional (3D) finite element method (FEM) and Lagrange multiplier algorithm have been used to evaluate the contact stresses. …”
Get full text
Get full text
Article -
11
Contact stress evaluation of involute gear pairs, including the effects of friction and helix angle
Published 2015“…In this paper, three-dimensional (3D) finite element method (FEM) and Lagrange multiplier algorithm have been used to evaluate the contact stresses. …”
Get full text
Get full text
Article -
12
Thermo-mechanical contact analysis of car disc brake squeal
Published 2008“…An integrated dynamic study of non-linear contact pressure analysis and a fully coupled transient thermal analysis under variation of contact algorithm are performed before executing the instability study of a typical passenger car brake system using the complex eigenvalue analysis method. …”
Get full text
Get full text
Get full text
Article -
13
Thermo-mechanical contact analysis of car disc brake squeal
Published 2008“…An integrated dynamic study of non-linear contact pressure analysis and a fully coupled transient thermal analysis under variation of contact algorithm are performed before executing the instability study of a typical passenger car brake system using the complex eigenvalue analysis method. …”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
Computing non-contactable drowsiness monitoring system with mobile machine vision
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
17
Development of visual odometry based machinery motion assessment system / Low Shee Teng
Published 2022“…Method 3 would be combining Method 2 with linear based EVM, and Method 4 would be purely linear based EVM. …”
Get full text
Get full text
Get full text
Thesis -
18
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
19
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article
