Search Results - (( java data normalization algorithm ) OR ( brain computing knowledge algorithm ))

  • Showing 1 - 17 results of 17
Refine Results
  1. 1

    High performance simulation for brain tumors growth using parabolic equation on heterogeneous parallel computer systems by Pheng, H. S., Alias, Norma, Mohd. Said, Norfarizan

    Published 2007
    “…The implementation of parallel algorithm based on parallel computing system is used to capture the growth of brain tumour. …”
    Get full text
    Get full text
    Article
  2. 2

    High performance simulation for brain tumours growth using parabolic equation on heterogeneous parallel computer system by Pheng H. S., Norma Alias, Norfarizan Mohd Said

    Published 2007
    “…The implementation of parallel algorithm based on parallel computing system is used to capture the growth of brain tumour. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    What, how and when to use knowledge in neural network application by Wan Ishak, Wan Hussain, Abdul Rahman, Shuzlina

    Published 2004
    “…Neural Networks attempt to bring computers a little closer to the brain's capabilities by imitating certain aspects of information processing in the brain,"i a highly simplified way.These disciplines formulate a formula to form a brain like function, called artificial neuron. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    High performance visualization of human tumor growth software by Alias, Norma, Mohd. Said, Norfarizan, Khalid, Siti Nur Hidayah, Sin, Dolly Tien Ching, Phang, Tau Ing

    Published 2008
    “…The platform for high performance computing of the parallel algorithms run on a distributed parallel computer system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  7. 7

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    P300 detection of brain signals using a combination of wavelet transform techniques by Motlagh, Farid Esmaeili

    Published 2012
    “…Detection of this component is the main challenge of many diagnostics (such as epilepsy) and research applications such as Brain Computer Interface (BCI) and Guilty Knowledge Test (GKT). …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Machine learning using robust AI techniques / Prof. Madya Dr. Nordin Abu Bakar by Abu Bakar, Nordin (Prof. Madya Dr.)

    Published 2012
    “…There is a model that studies the social behavior of humans called genetic algorithms (GA). An artificial neural network uses brain as a model to map decisions out of several inputs. …”
    Get full text
    Get full text
    Research Reports
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Investigations On Human Perceptual Maps Using A Stereo-Vision Mobile Robot by Eng, Swee Kheng

    Published 2018
    “…The outcomes indicate that the proposed computer vision techniques and computational mapping algorithms for human perceptual map building are robust and useful. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis