Search Results - (( java data normalization algorithm ) OR ( construct evaluation force algorithm ))
Search alternatives:
- normalization algorithm »
- construct evaluation »
- data normalization »
- evaluation force »
- force algorithm »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
Get full text
Get full text
Get full text
Thesis -
5
Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi
Published 2018“…The ability to construct accurate mathematical models of real systems is an important part of the control parameters in prototype PEM fuel cell systems for vehicles. …”
Get full text
Get full text
Book Section -
6
Optimal network reconfiguration and intelligent service restoration prediction technique based on Cuckoo search spring algorithm / Mohamad Izwan Zainal
Published 2022“…In this research, Cuckoo Search Spring Algorithm (CSSA) is proposed to enhance the robustness of algorithm by constructing the optimal network reconfiguration consist of reducing power losses and improve voltage profile with the various loadability factor as the constraint according to load profile, based on single and multiobjective model. …”
Get full text
Get full text
Thesis -
7
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
8
On the use of fuzzy rule interpolation techniques for monotonic multi-input fuzzy rule base models
Published 2009“…This can be accomplished with the use of a search algorithm, such as the brute force, genetic algorithm or etc…”
Get full text
Get full text
Get full text
Article -
9
Tubular Linear Switched Reluctance Actuator: Design And Characterization
Published 2019“…Next, the force and motion characteristics of the tubular LSRA are evaluated to verify the actuator design and the behaviour of the tubular LSRA is obtained through the open loop experiment. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Development of finite element model for soil-structure interaction
Published 2014“…All the redistributions and alterations of structural forces contributed in changing the yielding mechanisms of the considered frames. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
-
14
Secure IIoT-enabled industry 4.0
Published 2021“…Moreover, our proposed technique has been precisely verified with our constructed hybrid DL-enabled architectures and current benchmark DL algorithms. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
15
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Optimization of hydropower reservoir system using genetic algorithm for various climatic scenarios
Published 2015“…Accordingly, different operation policies were constructed and evaluated in this research. Generally, this research is divided into two main stages. …”
Get full text
Get full text
Get full text
Thesis -
17
Numerical optimization of elevated thin reinforced concrete shell structures subjected to extreme loading / Azizah Abdul Nassir
Published 2023“…Traditionally used mainly for roofing, the distribution of compression forces in shell structures has been underutilized in building construction. …”
Get full text
Get full text
Thesis -
18
Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model
Published 2017“…The shape change of SBS models towards target state is achieved by means of forced elongation of cable. Computational strategies for the shape change consist of two stages: the derivation of incremental equilibrium equations and optimization of the cables forced elongation by sequential quadratic programming. …”
Get full text
Get full text
Thesis -
19
Modelling and Control of Ankle Foot Orthosis (AFO) for Children Utilising Soft Computing Towards Intelligent Approach
Published 2024“…The PID controllers were tuned automatically by the PSO algorithm based on the same identified models. The performance of both developed controllers was compared and analyzed. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
