Search Results - (( java data normalization algorithm ) OR ( basic computer support algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- support algorithm »
- computer support »
- basic computer »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
-
4
-
5
Unit Kesihatan UiTM (Perak) appointment scheduling system using Genetic Algorithm (GA) / Nur Amiera Abdul Rahman
Published 2014“…Alhamdulillah, my heartfelt thanks and gratitude to Allah SWT, that he was willing to give a chance with the good health and leisure time to complete this final year project proposal titled Unit Kesihatan UiTM (Perak) Appointment Scheduling System Using Genetic Algorithm (GA). The final year project has been properly drawn for Universiti Teknologi Mara (UiTM), basically for the students to complete the degree program leading to a Bachelor of Science (Hons) in Computer Science. …”
Get full text
Get full text
Thesis -
6
Human emotion recognition for computer games player using AdaBoost algorithm / Muhamad Nur Adhwa Muhamad Shukri
Published 2017“…The idea present in applicationbased regarding how computer game can effect player emotion to support other methodology in marketing sales known as “Emotion Level” to solve the problem. …”
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
8
Agent-based extraction algorithm for computational problem solving
Published 2015“…The agent-based model for CPS has been developed in JADE environment which applied the basic Believe, Desire and Intention (BDI) architecture to support multi-agent system environment. …”
Get full text
Get full text
Thesis -
9
Investigating and developing the best method in shortest path for implementing a geographical information system (e-map) for Peninsular Malaysia
Published 2005“…Assessment will be done by calculating the algorithm complexion and runtime using the computer. …”
Get full text
Get full text
Monograph -
10
-
11
-
12
DSC766: Text Analytics / College of Computing, Informatics and Mathematics
Published 2020“…Student will learn the basic concepts, principles, and major algorithms in text mining and their potential applications.…”
Get full text
Get full text
Get full text
Teaching Resource -
13
Shot boundary detection based on orthogonal polynomial
Published 2019“…The outcomes of the comparative analysis show the superior performance of the proposed algorithm against other existing algorithms.…”
Get full text
Get full text
Get full text
Article -
14
Zero skew clock routing for fast clock tree generation
Published 2008Get full text
Get full text
Get full text
Proceeding Paper -
15
Robust correlation feature selection based support vector machine approach for high dimensional datasets
Published 2025“…The third step employs the support vector machine algorithm to calculate prediction values. …”
Get full text
Get full text
Get full text
Article -
16
Enhancing predictive crime mapping model using association rule mining for geographical and demographic structure
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Depression Detection Based on Features of Depressive Behaviour Through Social Media Analytic: A Systematic Literature Review
Published 2024“…Furthermore, it is also shown that various machine learning algorithms are used, and the most used are Neural Network and Support Vector Machine. …”
Conference Paper -
18
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
19
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…The iterative search of shoot towards better light supported by the root counterparts leads to an optimization idea of TPO algorithm. …”
Get full text
Get full text
Article -
20
Tree physiology optimization on SISO and MIMO PID control tuning
Published 2018“…The iterative search of shoot towards better light supported by the root counterparts leads to an optimization idea of TPO algorithm. …”
Get full text
Get full text
Article
