Search Results - (( post implementation from algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- post implementation »
- implementation from »
- data normalization »
- from algorithm »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
Power system network splitting and load frequency control optimization using ABC based algorithms / Kanendra Naidu a/l Vijyakumar
Published 2015“…This research presents a modified optimization program for the system splitting problem in large scale power system based on Artificial Bee Colony algorithm and graph theory. The post-islanding frequency stability is maintained by optimizing the Load Frequency Control‘s parameters. …”
Get full text
Get full text
Thesis -
5
The implementation of post-processing data thinning for multibeam echo sounding data
Published 2006Get full text
Get full text
Get full text
Conference or Workshop Item -
6
-
7
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
8
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…The prefiltering and post processing will further enhance the ability of the algorithm to remove noise from the documents. …”
Get full text
Get full text
Thesis -
9
Application of artificial neural network for automatic contingency analysis in power security assessment / Ismail Musirin and Titik Khawa Abdul Rahman
Published 2006“…The ANN is developed in order to predict the post-outage severity index from a set of preoutage data set. …”
Get full text
Get full text
Get full text
Article -
10
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
11
The effects of compiler optimizations in face recognition system
Published 2009Get full text
Article -
12
A novel hybrid classification model of genetic algorithms, modified k-Nearest Neighbor and developed backpropagation neural network
Published 2014“…The purpose is benefitting from the synergies obtained from combining these technologies for the development of classification models. …”
Get full text
Get full text
Get full text
Article -
13
Use of hybrid classification algorithm for land use and land cover analysis in data scarce environment
Published 2013“…In this study, vegetation indices, tasseled cap transformation, hybrid classification as a combination of k-means and support vector machine algorithms,and post-classification comparison were respectively implemented to detect and assess LULC in Halabja. …”
Get full text
Get full text
Thesis -
14
-
15
Finger Exoskeleton for Early Acute Post Stroke Rehabilitation: Control Design and Performance Analysis
Published 2023Conference Paper -
16
Train Track Misalignment Detection System
Published 2014“…Direction-cosine-matrix (DCM) algorithm was also implemented to detect and correct numerical error for the gyroscope via reference data from accelerometer. …”
Get full text
Get full text
Final Year Project -
17
Restaurant review system with data visualization and text search using TF-IDF algorithm / Syazwina Abd Hamid
Published 2020“…Outcome gained from functionality and usability testing indicate that all functions in the system work perfectly and received promising feedback from users. …”
Get full text
Get full text
Thesis -
18
Improvement of Cepstrum Analysis for the Purpose to Detect Leak, Feature and Its Location in Water Distribution System based on Pressure Transient Analysis
Published 2017“…To extract this signal, many signal analysis methods were implemented by researchers such as cross-correlation, genetic algorithm, and wavelets transform. …”
Get full text
Get full text
Get full text
Article -
19
Discovering decision algorithm of distance protective relay based on rough set theory and rule quality measure
Published 2011“…The high prediction accuracy rate and the close-to-unity area under curve (AUC) value of ROC curve of the discovered relay decision algorithm (prediction rules) from the Rough-Set-Theory-and-Genetic-Algorithm data mining verified the algorithm’s generalized ability to predict as well as discriminate future unknown-trip-status relay events. …”
Get full text
Get full text
Thesis -
20
Sentiment mining in twitter for early depression detection / Najihah Salsabila Ishak
Published 2021“…A comparison between built-in Scikit Learn Naive Bayes algorithm, and the scratch Naive Bayes algorithm is used to measure its effectiveness in terms of accuracy. …”
Get full text
Get full text
Thesis
