Search Results - (( java data normalization algorithm ) OR ( construct validation from algorithm ))
Search alternatives:
- normalization algorithm »
- construct validation »
- data normalization »
- validation from »
- from algorithm »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Nine landslide conditioning factors such as slope, slope aspect, altitude, land use, lithology, distance from rivers, distance from roads, distance from faults, and rainfall were constructed in geographical information system. …”
Get full text
Get full text
Article -
5
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm
Published 2021“…The results obtained from the resulting rollout policy with CPLEX execution during rollout are also presented to validate the reduced model and the matheuristic algorithm. …”
Get full text
Get full text
Article -
7
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
text::Thesis -
8
-
9
-
10
Improved dung beetle optimization algorithm and finite element analysis for spindle optimization
Published 2024“…Through the combination of the IDBO algorithm and FEA method, the mass of the spindle is reduced from 46.582 kg obtained by the IDBO algorithm solution to 28.479 kg, a total reduction of 38.86%, while meeting design requirements such as maximum total deformation. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
13
Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat
Published 2024“…This is due to the data generated from the numerical model possess the pattern for the ML algorithm ease of prediction. …”
Get full text
Get full text
Get full text
Thesis -
14
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
15
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset. Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
16
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…From the construction of DuriO, 21 durian characteristics are produced in Webpage analysis phase. …”
Get full text
Get full text
Thesis -
17
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
18
Harmony Search Approach In The Strut And Tie Model To Optimise The Stress Distribution In A Concrete Box Girder
Published 2021“…Optimisation using metaheuristic algorithm could provide an alternative for more efficien t STM construction. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A genetic algorithm based fuzzy inference system for pattern classification and rule extraction
Published 2023“…The impetus for developing a new and efficient GA-FIS model arises from the need of constructing fuzzy rules directly from raw data sets that combines good approximation and classification properties with compactness and transparency. …”
Article -
20
Construction Noise Prediction Using Stochastic Deep Learning
Published 2022“…Construction noise is an occupational noise that is potentially harmful, and it usually originates from earth-moving machines in construction sites. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
