Search Results - (( java data normalization algorithm ) OR ( program evaluation force algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- evaluation force »
- force algorithm »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
-
5
Classification models for higher learning scholarship award decisions
Published 2018“…Each model was evaluated using technical evaluation metric, such contingency table metrics, and accuracy, precision, and recall measures. …”
Get full text
Get full text
Get full text
Article -
6
Machine learning model to predict the contact of angle using mineralogy, TOC and process parameters in shale
Published 2021“…Minerology and Total Organic Carbon (TOC) content are some of the important parameters to be evaluated for reservoir characterization. Wettability is the capability of a liquid to remain in contact with a solid surface affected by the balance of both intermolecular force of adhesive force (liquid to surface) and cohesive force (liquid-liquid). …”
Get full text
Get full text
Conference or Workshop Item -
7
Modular motor driver with torque control for gripping mechanism
Published 2023“…In implementing the project, several algorithms were tested to achieve the torque control algorithm requirement including on-off algorithm, P algorithm, PI algorithm, PD algorithm and PID algorithm. …”
Conference paper -
8
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
9
Adaptive constitutive analytical model code for rubber bearings with load-dependent variable analytical model in seismically isolated steel structures
Published 2026“…Thereafter, a dedicated computational algorithm and macro program were developed and implemented within a finite-element software environment to enable real-time adjustment of the lateral stiffness and damping properties of rubber bearings at each time step based on instantaneous vertical reaction forces. …”
Get full text
Get full text
Get full text
Article -
10
Development of finite element model for soil-structure interaction
Published 2014“…Then, the special finite element algorithm and computer program (2DSSI) is developed to perform two-dimensional nonlinear SSI analysis by considering interfacial behavior of soil and frame elements. …”
Get full text
Get full text
Thesis -
11
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
-
13
Form Finding And Shape Change Analysis Of Spine Inspired Bio-Tensegrity Model
Published 2017“…The shape change of SBS models towards target state is achieved by means of forced elongation of cable. Computational strategies for the shape change consist of two stages: the derivation of incremental equilibrium equations and optimization of the cables forced elongation by sequential quadratic programming. …”
Get full text
Get full text
Thesis -
14
Multistage quality control in manufacturing process using blockchain with machine learning technique
Published 2023“…DoS, DDoS, intrusion, a man in the middle (MitM), brute force, cross-site scripting (XSS), and searching are the attacks detected by BCT. …”
Get full text
Get full text
Article -
15
Designing drug candidates for rare diseases
Published 2012Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
Assessment of proposed lateral resistance system used with framed structures
Published 2016“…The developed finite element program and efficiencies of the offered devices in terms of structural response are evaluated. …”
Get full text
Get full text
Thesis -
17
Design and manufacturing of a new CNC gantry machine with double motion feed drive system / Seyed Reza Besharati
Published 2015“…One is selected among five designs mathematically and optimized by MOGA (multi-objective genetic algorithm) in ANSYS software. In the optimization process, the gantry’s natural frequency is maximized, thus minimizing the total gantry weight and deformation against mechanical forces. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…The multilayer shell and beam elements are available in the element library of this finite element program.Both above finite element codes are equipped with pre, post processing and animation graphic facilities. …”
Get full text
Get full text
Thesis
