Search Results - (( parameter data normalization algorithm ) OR ( java implementation among algorithm ))

Refine Results
  1. 1

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma by Sani , Danjuma

    Published 2017
    “…Many normal parameter reduction algorithms exist to handle parameter reduction and maintain consistency of decision choices. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…According to the simulation results, the proposed algorithm produces the best solution among all algorithms in the proposed cases. � 2021 Little Lion Scientific…”
    Review
  6. 6

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…For example, the distribution analogues to the normal distribution in linear data is known as circular normal distribution. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Smart diagnosis of long bone tumor / Mazni Parimin by Parimin, Mazni

    Published 2005
    “…The data samples involve in this project are data that had been normalize and become the inputs of the prototype. …”
    Get full text
    Get full text
    Student Project
  9. 9

    PSO and Linear LS for parameter estimation of NARMAX/NARMA/NARX models for non-linear data / Siti Muniroh Abdullah by Abdullah, Siti Muniroh

    Published 2017
    “…Results suggest that the PSO algorithm is viable alternative to other established algorithms for LLS parameter estimation. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Dynamic robust bootstrap method based on LTS estimators by Midi, Habshah, Uraibi, Hassan Sami, Al-Talib, Bashar Abdul Aziz Majeed

    Published 2009
    “…In order to make reliable inferences about the parameters of a model, require that the parameter estimates are normally distributed. …”
    Get full text
    Get full text
    Article
  12. 12

    The normalized random map of gradient for generating multifocus image fusion by Ismail, ., Kamarul Hawari, Ghazali

    Published 2020
    “…The proposed algorithm successes to supersede difficulties of mathematical equations and algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Smart energy meter with adaptive communication data transfer algorithm for electrical energy monitoring by Ab Halim, Haizum Hanim

    Published 2021
    “…Thus, in this thesis, a new Smart Energy Meter (SEM) with adaptive data transfer algorithm is designed to accommodate the problem. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions by Ahmed, Mashuk, Nasser, Abdullah B., Kamal Z., Zamli, Heripracoyo, Sulistyo

    Published 2022
    “…CS and JA have implemented in the same platform (Intellij IDEA Community Edition 2020.2.3) using the same language (Java). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Simulation algorithm of bayesian approach for choice-conjoint model by Zulhanif

    Published 2011
    “…Generally in Choice-Conjoint method the Multinomial Logit Model (MNL) is normally used to analyze choice conjoint data, but the MNL has some serious limitations. …”
    Get full text
    Thesis
  16. 16

    Dynamic Robust Bootstrap Algorithm for Linear Model Selection Using Least Trimmed Squares by Uraibi, Hassan Sami

    Published 2009
    “…One of the important assumptions of the linear model is that the error terms are normally distributed. Unfortunately, many researchers are not aware that the performance of the OLS can be very poor when the data set that one often makes a normal assumption, has a heavy-tailed distribution which may arise as a result of the presence of outliers. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Statistical approach on grading: mixture modeling by Md. Desa, Zairul Nor Deana

    Published 2006
    “…In the conditional Bayesian model, we assume the data to follow the Normal Mixture distribution where the grades are distinctively separated by the parameters: means and proportions of the Normal Mixture distribution. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…Thus, this study proposes the development of algorithms to detect and classify jamming attacks using a set of parameters on the physical layer and MAC in MANET. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Pairwise test suite generator tool based on harmony search algorithm (HS-PTSGT) by Lai, Yi Xiang

    Published 2014
    “…From the comparison with other existing pairwise testing tools in term of size, it is shown that the strategy used in HS PTSGT can effectively generate optimum test suite with minimized test data and performed better on certain parameter size.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  20. 20

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. …”
    Get full text
    Get full text
    Thesis