Search Results - (( java data normalization algorithm ) OR ( construct validity search algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- construct validity »
- java »
- search »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
Cuckoo Search Algorithm-Based Zeta Converter In A Photovoltaic System Under Partial Shading Condition
Published 2021“…To validate the effectiveness of the work, a Cuckoo Search maximum power point tracking model was constructed in MATLAB Simulink using various irradiance patterns for Zeta converter. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Harmony Search Approach In The Strut And Tie Model To Optimise The Stress Distribution In A Concrete Box Girder
Published 2021“…Optimisation using metaheuristic algorithm could provide an alternative for more efficien t STM construction. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
5
-
6
Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic
Published 2012“…The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
Get full text
Get full text
Get full text
Thesis -
7
PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah
Published 2017“…PSO is a swarm-based search algorithm perform a stochastic search to explore the search space. …”
Get full text
Get full text
Thesis -
8
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…To overcome these limitations, this study proposes a technique known as an n-decomposition genetic algorithm. This algorithm uses a variable-length search to identify the best location to embed the secret message by incorporating constraints to avoid local minimum traps. …”
Get full text
Get full text
Get full text
Thesis -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
10
Enhanced weight-optimized recurrent neural networks based on sine cosine algorithm for wave height prediction
Published 2021“…To validate the performance of the proposed models, metocean datasets have been used. …”
Get full text
Get full text
Article -
11
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Competitive improvement of the time complexity to encode fractal image: by applying symmetric central pixel of the block
Published 2021“…Secondly, we construct the odd-size pixel block alternative to an even-size pixel block for validation of the symmetric central pixel (CP). …”
Get full text
Get full text
Article -
13
Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak
Published 2025“…The model employs a two-level structure, where the first level uses standard soft constraints as the objective function to evaluate solution quality, while the second level dynamically adapts to faculty-specific preferences. A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A Hybrid Metaheuristic Technique Based on Grey Wolf Optimisation, Symbiotic Organism Search, and Ant Colony Optimisation for Solving Multi-Objective Vehicle Routing Problems
Published 2025“…This study developed a hybrid metaheuristic algorithm involving grey wolf optimization, symbiotic organism search, and ant colony optimization (HMGSA) to address the multi-objective VRP. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain
Published 2019“…First, the vibration signals of gear with different fault conditions were decomposed by a fourth-level discrete wavelet packet transform, and the statistical features at all constructed nodes were derived. Second, the MFO algorithm was utilised to select the optimal discriminative features. …”
Get full text
Get full text
Get full text
Article -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
Performance evaluation of hospital site suitability using multilayer perceptron MLP and analytical hierarchy process AHP models in Malacca, Malaysia
Published 2022“…The outcome of the predicted site models was validated utilizing CFS 10-fold cross-validation, as well as ROC curve (receiver operating characteristic curve). …”
Get full text
Get full text
Article -
18
Integrated examination and analysis model for improving mobile cloud forensic investigation
Published 2022“…FEDO models the Linearly Decreasing Weight (LDW) strategy based Particle Swarm Optimization (PSO) algorithm on the case-specific evidence to improve the searching capability of the investigation across the massive MCC environment. …”
Get full text
Get full text
Thesis -
19
-
20
Defect recognition method for magnetic leakage detection in oil and gas steel pipes based on improved neural networks / Wang Jie ... [et al.]
Published 2024“…To enhance the accuracy of predicting pipeline defect sizes, this study introduces a magnetic leakage detection system, employing Backpropagation (BP) neural networks optimized with genetic algorithms. Traditional BP networks face challenges, including parameter determination and slow convergence, addressed through genetic algorithms' global search capabilities. …”
Get full text
Get full text
Article
