Search Results - (( java data normalization algorithm ) OR ( construct validity window algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Developing individualised therapy for colistin through application of pharmacokinetic model tailored for critically ill Malaysian patients utilizing the HPLC-FLD by Zabidi, Mohd Shafie

    Published 2025
    “…The Non-Parametric Adaptive Grid algorithm within Pmetrics software was used to develop a colistin pharmacokinetic model using meta-analysis data from 15 pharmacokinetic studies, and external validation of the final model was performed in 25 subjects (Malaysian and meta-analysis data). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Numerical Modelling of the Electric Vehicle Cabin Cooling by Jong, Fabian Chin Peng

    Published 2019
    “…The study of the cabin cooling system in an Electric Vehicle is vital to understand its energy consumption behaviour, where such information can be acted upon to better optimise and improve the overall energy consumption of the vehicle, thus translating into a longer driving range.Factors that contribute to the total thermal load in a cabin space are modelled, where in Edinburgh has a value of 1880.14 W and 3136.14 W for Kuala Lumpur.Expansion is performed in the construction of the solar thermal load model, which has the capability of calculating solar irradiance based on various inputs, which after validation produces a relative error of 7.17 %. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  7. 7

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…A prototype is built using visual basic 2008 to validate the proposed blogs search engine. It is a windows application with http connection protocol. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. …”
    Get full text
    Get full text
    Thesis
  12. 12

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis