Search Results - (( java data normalization algorithm ) OR ( construct validation clustering algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Effective gene selection techniques for classification of gene expression data by Yeo, Lee Chin

    Published 2005
    “…Various k-means clustering algorithms and model-based clustering algorithms are proposed to group the genes. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata by Darvishy, Asghar

    Published 2019
    “…However, the existing clustering algorithms do not take into consideration the news nature in clustering the news items. …”
    Get full text
    Get full text
    Thesis
  4. 4

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong by Chong, Chun Yong

    Published 2016
    “…Even if maintainers possess additional information that could be useful to guide and improve the clustering results, traditional clustering algorithms have no way to take advantage of this information. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Linear programming approach for scheduling sports league problems in Malaysia by Ahmad Rosdi, Muhammad Ifwat

    Published 2017
    “…Besides, the venues (stadiums) involve are predefined before the construction of the schedule begin. To validate the formulated model, we compare results obtain by heuristic approach using the same data. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…Besides that, randomness test results demonstrate that the generated pseudo-random sequences from the multistability regions fail to pass most of the statistical tests. Finally, to choose valid pseudo-random sequences from multistability regions, this thesis constructs a new algorithm based on a new 3D multi-attribute chaotic system exhibiting extreme multistability behaviors. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Objective assessment of psoriasis lesion thickness for PASI scoring 3D digital imaging by Hurriyatul , Fitriyah, Ahmad Fadzil, M Hani

    Published 2010
    “…Thickness values of 122 3D images taken from 39 patients are grouped into 4 PASI thickness score using K-means clustering. Validation on lesion base construction is performed using twelve body curvature models and show good result with coefficient of determinant (R2) is equal to 1.…”
    Get full text
    Citation Index Journal
  10. 10

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Predicting 30-day mortality after an acute coronary syndrome (ACS) using machine learning methods for feature selection, classification and visualization by Nanyonga Aziida, Sorayya Malek, Firdaus Aziz, Khairul Shafiq Ibrahim, Sazzli Kasim

    Published 2021
    “…Feature selection methods such as Boruta, Random Forest (RF), Elastic Net (EN), Recursive Feature Elimination (RFE), learning vector quantization (LVQ), Genetic Algorithm (GA), Cluster Dendrogram (CD), Support Vector Machine (SVM) and Logistic Regression (LR) were combined with RF, SVM, LR, and EN classifiers for 30-day mortality prediction. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Reservoir Inflow Forecasting Using Artificial Neural Network and Adaptive Neuro-Fuzzy Inference System Techniques by Googhari, Shahram Karimi

    Published 2007
    “…The 6 years daily data from 1995-1997 and 2002-2004 were used for training and validation of the models. Cross validation of training and validation data sets was also considered to obtain the best data set. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Time series modeling of water level at Sulaiman Station, Klang River, Malaysia by Galavi, Hadi

    Published 2010
    “…The estimation of parameters of the model is accomplished using the hybrid learning algorithm consisting of standard neural network backpropagation algorithm and least squares method. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16