Search Results - (( java data normalization algorithm ) OR ( construct visualization means algorithm ))

  • Showing 1 - 16 results of 16
Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Sentiment Analysis of Sexual Harassment in Malaysia on Twitter Using Machine Learning Algorithms by Nurellezia, Suleiman

    Published 2023
    “…Lastly, the data are visualized using graphs and charts and an overall visualization dashboard is generated for data reporting which helps to analyze and extract meaning behind the sentiments by relating the visualizations with real-life events from legitimate sources such as news and articles. …”
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  6. 6

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic by Mohammed, Athraa Jasim

    Published 2012
    “…The blogs search engine consists of three main phases which are crawling using RSS feeds algorithm, indexing weblogs algorithm and searching technique with Fuzzy logic. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Near infrared palm image acquisition and two-finger valley point-based image extraction for palm vascular pattern detection by Mohd Noh, Zarina

    Published 2019
    “…In summary, vascular pattern can be detected visually from the palm image acquired by the NIR palm image acquisition device developed in this research.…”
    Get full text
    Get full text
    Thesis
  11. 11

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Using the line array representation as an alternative method for understanding whole number multiplication among primary students by Chai, Chin Pheng

    Published 2015
    “…Overall, the resulting measures have shown to have good reliability as indicated by a Cronbach's alpha value of 0.79 for Year 3 and 0.82 for Year 5. The higher mean person estimates (Year 3 = +0.27 logits and Year 5 = +0.98 logits) compared with the mean item threshold defaulted at 0.00 logit showed that items were likely well matched for Year 3 students and easy for Year 5 students. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    Development and characterization of anonymous nuclear markers to determine genetic variation in two groupers species and their hybrids by Ahmad Zaidi Tani

    Published 2015
    “…An unweighted pair-group method with arithmetic mean (UPGMA) phenogram was constructed based on the GD and CCC values to verify the genetic relationship among the grouper broodstock operational taxonomic units (OTUs). …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique by Liew, Siaw Hong

    Published 2016
    “…Wavelet Packet Decomposition (WPD), mean of amplitude, coherence, crosscorrelation, hjorth parameter and mutual information were used construct the proposed person authentication model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Performance evaluation on quantized weight for convolutional neural network based object detection by Putra, Mohd Hasbullah

    Published 2021
    “…Three types of scalar quantization are used to quantize the CNN weights namely symmetric uniform quantizer, asymmetric uniform quantizer and non-uniform quantizer designed using k-means algorithm. The quantization reduces the storage and computation requirements. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Fusion model of unmanned aerial vehicle-based digital elevation model for accuracy improvement mapping by Isola, Ajibola Ismaila

    Published 2020
    “…The photos were processed using Agisoft algorithm. In the end, seven DEMs were exported in tiff file format. …”
    Get full text
    Get full text
    Thesis