Search Results - (( java data normalization algorithm ) OR ( construct validation toward algorithm ))
Search alternatives:
- normalization algorithm »
- construct validation »
- data normalization »
- validation toward »
- toward algorithm »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology.…”
Get full text
Get full text
Thesis -
5
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…Rijndael (AES) is a well-known block cipher algorithm with proven robustness towards countless cryptographic attacks. …”
Get full text
Get full text
Thesis -
6
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
7
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Polytechnic science lecturers’ intention to use ICT as a tool in northeast Nigeria: a smart PLS approach
Published 2017“…Several studies affirmed a significant influence of perception of usefulness and perception on ease-of-use on attitude towards technology acceptance and were validated in different behavioural intention to use. …”
Get full text
Get full text
Article -
9
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…Fusion of MEMD and sLORETA results in approximately zero localization error in terms of spatial difference with the validated MRI reference. High accuracy results of proposed algorithm using non-invasive and low-resolution EEG provide the potential of using this work for pre-surgical evaluation towards epileptogenic zone localization in clinics.…”
Get full text
Get full text
Article -
10
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…Fusion of MEMD and sLORETA results in approximately zero localization error in terms of spatial difference with the validated MRI reference. High accuracy results of proposed algorithm using non-invasive and low-resolution EEG provide the potential of using this work for pre-surgical evaluation towards epileptogenic zone localization in clinics.…”
Get full text
Get full text
Get full text
Article -
11
Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms
Published 2023“…The classifiers are validated and evaluated using accuracy, precision, recall, and f1-score along with 10-folds cross validation. …”
Get full text
Get full text
Final Year Project Report / IMRAD -
12
Computational methods for self-assembly of DNA nanostructures / Ong Hui San
Published 2016“…The efforts are concerted towards self-assembly mechanism of heterogeneous DNA shapes, construction of multiple configurations that can form the identical endstructures, exploration of a less stringent sequence design and predicting connectivity map for the DNA nanostructures assembly. …”
Get full text
Get full text
Thesis -
13
Variable Speed Control Of Two-Mass Wind Turbine System Via State Feedback With Adaptation Law
Published 2018“…Wind turbine convert kinetic energy from the wind to rotational energy and then to electrical energy.In a wind energy conversion system (WECS),its electrical power control (EPC) side demanded a maximum mechanical power from the mechanical power control (MPC) side despite any intermittent wind and seasonal interference.Therefore,it is necessary to develop a variable speed algorithm for a modern WECS.For a two-mass horizontal axis wind turbine, the rotor and generator stiffness is commonly being neglected in the system dynamic.The inclusion of stiffness in system dynamic introduces integral term in the system expression and hence,incur mathematical complexity in the controller design phase.Contrary,this study consider stiffness as unknown parameter in the wind turbine dynamic.In order to obtain the maximum output power,the design of an algorithm with adaptation law for the speed control of a two-mass wind turbine system with an unknown stiffness is proposed in this research.The algorithm is formulated using a full-state feedback.In pursuance of solving the tracking control as a regulation case,the speed of the turbine is bijective mapped into the error dynamic.The stability of the proposed algorithm is guaranteed by Lyapunov.The adaptation law used in the variable speed algorithm is to successfully acquire the adaptability of the algorithm towards an unknown stiffness.Therein,the estimated stiffness is augmented in the Lyapunov function.The Lie derivative of the function is made into a negative semi-definite via the non-negative control parameters.In order to control the rotor speed to sustain the optimum tip-speed ratio (TSR),as well as obtaining the maximum power output from the turbine,the proposed algorithm is constructed.A MATLAB with Simulink® toolbox is used to validate the effectiveness of the proposed control speed.The simulation result showed that the rotor speed achieved an asymptotic tracking towards the demanded rotor speed irrespective of the stiffness value.The error is proved to be minimized as the integral of absolute error (IAE) obtained for wind turbine with stiffness ranging from 134550 Nmrad-1,269100 Nmrad-1,and 403650 Nmrad-1 are recorded as 0.003088,0.003063 and 0.003088 respectively. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
-
16
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…A prototype of the proposed architecture was built and validated which the focus is towards determining the decision algorithm precision and measuring the video assimilation. …”
Get full text
Get full text
Thesis -
17
Automation of Quranic Readings Gathering Process
Published 2021“…The system was applied to the verses of Surah Al-Baqarah and the output text was carefully validated against authentic books in this field. This system can be the basis of software systems for teaching and vocal construction of Quranic readings gathering. …”
Get full text
Get full text
Get full text
Get full text
Article -
18
Tourism Sustainable Competitiveness Indicator in Malaysia: Construct and Forecasting Ability
Published 2023“…The core framework of the constructed TSCI was selected based on a rigorous variable importance assessment using random forest algorithm. …”
Get full text
Get full text
Get full text
Thesis -
19
Modeling and sensitivity analysis of a multi-nets anns model for real-time performance-based condition monitoring of an industrial gas turbine engine
Published 2016“…Three-layer feed-forward configuaration is chosen to construct the networks, the Levenberg-Marquardt algorithm is used as the training function, and the k-fold cross-validation process is employed to obtain the optimum number of neurons in the hidden layers. …”
Get full text
Get full text
Article -
20
Modeling and sensitivity analysis of a multi-nets anns model for real-time performance-based condition monitoring of an industrial gas turbine engine
Published 2016“…Three-layer feed-forward configuaration is chosen to construct the networks, the Levenberg-Marquardt algorithm is used as the training function, and the k-fold cross-validation process is employed to obtain the optimum number of neurons in the hidden layers. …”
Get full text
Get full text
Article
