Search Results - (( java data normalization algorithm ) OR ( program detection clustering algorithm ))
Search alternatives:
- normalization algorithm »
- detection clustering »
- data normalization »
- program detection »
- java »
-
1
-
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
-
4
A maximal-clique-based clustering approach for multi-observer multi-view data by using k-nearest neighbor with S-pseudo-ultrametric induced by a fuzzy similarity
Published 2024“…The proposed clustering algorithm is programmed and tested on synthetic and four real-world datasets using the R software. …”
Get full text
Get full text
Article -
5
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
6
STATISTICAL FEATURE LEARNING THROUGH ENHANCED DELAUNAY CLUSTERING AND ENSEMBLE CLASSIFIERS FOR SKIN LESION SEGMENTATION AND CLASSIFICATION
Published 2021“…In this paper, we proposed profound learning strategy to address three primary assignments developing in the zone of skin lesion picture preparation, i.e., dermoscopic highlight, extraction and detection. A profound algorithm comprising of preprocessing in CIELAB color space and Delaunay triangulation based clustering along with Particle Swarm Optimization (PSO) is proposed for the segmentation. …”
Get full text
Get full text
Get full text
Article -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
8
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
9
Handwriting recognition using webcam for data entry
Published 2015“…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
Get full text
Get full text
Conference or Workshop Item -
10
Handwriting recognition using webcam for data entry
Published 2014“…The modules have its distinct characteristics which is trained using the Back-Propagation algorithm to cluster the pattern recognition capabilities among different samples of handwriting. …”
Get full text
Get full text
Final Year Project -
11
Characterization and pathogenicity of Rhizoctonia spp isolated from various crop species in different agroecosystems in Malaysia
Published 2017“…This will assist in planning for the right crop rotation and proper disease management programs.…”
Get full text
Get full text
Thesis -
12
Random Amplified Polymorphic DNA Analysis of Four Breeds of Sheep in Malaysia
Published 1999“…The neighbour-joining and the UPGMA trees based on the Dice's and Jaccard's similarity indices showed little or no consensus on the clustering of the individuals in each population. Genetic distance between populations ranged from 0.1040 to 0.1357 based on the Dice's algorithm while the distance based on the Jaccard's algorithm ranged from 0.1875 to 0.2381. …”
Get full text
Get full text
Thesis -
13
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Preliminary study on genetic distance of Vibrio parahaemolyticus isolates from diseased fish and shrimp brackishwater ponds by random amplified polymorphic DNA (RAPD) in Malaysia
Published 2003“…Two published 10-mer arbitrary primers (Gen1-50-01 and Gen1-50-02) were used for detecting DNA polymorphisms. RAPDistance program (version 1.04) was used to analyze the RAPD patterns. …”
Get full text
Get full text
Get full text
Article -
15
New techniques incorporating computational intelligence based for voltage stability evaluation and improvement in power system / Nur Fadilah Ab. Aziz
Published 2014“…In addition, a new method to detect weak areas in a system termed as Weak Area Clustering Margin (WACM) was also developed. …”
Get full text
Get full text
Thesis
