Search Results - (( pre implementation from algorithm ) OR ( java data normalization algorithm ))

Refine Results
  1. 1

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  6. 6

    DEEP LEARNING ALGORITHM IMPLEMENTATION FOR SHIP DETECTION IN SPOT SATELLITE IMAGES by HANIZAM, MOHD HAZIQ NAZMI

    Published 2019
    “…The implementation of the algorithm consists of three stages which are pre-processing, network training and accuracy evaluation. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Development of self-learning algorithm for autonomous system utilizing reinforcement learning and unsupervised weightless neural network / Yusman Yusof by Yusof, Yusman

    Published 2019
    “…In the algorithm development a step-by-step example of the algorithm implementation is presented and then successfully implemented in Lego Mindstorm obstacle avoiding mobile robot as a proof of concept implementation of the hybrid AI algorithm. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancement of stemming process for malay illicit web content by Noor Fatihah , Mazlam

    Published 2012
    “…As conclusion, the implementation of new features in enhanced stemming algorithm can reduce the errors produce in Sembok’s stemming algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…MAC protocols have been extensively researched from several angles. This encompasses the implementation in the area of Wave Division Multiplexing (WDM) networks and Mobile Adhoc Networks (MANET). …”
    Get full text
    Get full text
    Article
  11. 11

    Implementation of Frequency Drift for Identification of Solar Radio Burst Type II by Roslan, Umar, Nur Zulaikha, Mohd Afandi, Zamri, Zainal Abidin

    Published 2016
    “…The results of the frequency drift implementation in classification algorithm show that the algorithm developed gave almost similar determination as in manual detection. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Enhancement of parallel thinning algorithm for handwritten characters using neural network by Engkamat, Adeline

    Published 2005
    “…Thus, this project presents a framework for the implementation of a multilayer perceptron neural network with backpropagation algorithm, in the Parker thinning algorithm in order to produce a fast fully parallel thinning algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe by Kennie Yeoh , Eng Hoe

    Published 2001
    “…A flow of the process goes from fingerprint acquisition using inkpads and a scanner, followed by image pre-processing steps to produce cleaner more visually acceptable images. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Implementation of Frequency Drift for Identification of Solar Radio Burst Type II by Afandi, N.Z.M., Abidin, Z.Z., Umar, R., Sabri, N.H., Ibrahim, Z.A., Monstein, C.

    Published 2016
    “…The results of the frequency drift implementation in classification algorithm show that the algorithm developed gave almost similar determination as in manual detection. …”
    Get full text
    Get full text
    Article
  15. 15

    Car dealership web application by Yap, Jheng Khin

    Published 2022
    “…The transfer learning algorithm pre-trained the River adaptive random forest regressor and classifier by transferring the tree structures and weights from the Scikit-learn fitted random forest regressor and classifier, respectively. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    A soft hierarchical algorithm for the clustering of multiple bioactive chemical compounds by Salim, Naomie, Shah, J. Z.

    Published 2007
    “…The results of the algorithm show significant improvement in comparison to a similar implementation of the hard c-means algorithm.…”
    Get full text
    Get full text
    Get full text
    Book Section
  17. 17

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…At the same time implementing elitism feature increases the computational complexity of the algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Advances in metaheuristics: Applications in engineering systems by Ganesan, T., Vasant, P., Elamvazuthi, I.

    Published 2016
    “…It discusses topics such as algorithmic enhancements and performance measurement approaches, and provides insights into the implementation of metaheuristic strategies to multi-objective optimization problems. …”
    Get full text
    Get full text
    Book
  19. 19

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Camera Independent Face Recognition Algorithm In Visual Surveillance by Yew, Chuu Tian

    Published 2015
    “…The flandmark facial landmark detector is implemented to determine the location of the eyes and new face images are obtained by cropping the HE pre-processed images. …”
    Get full text
    Get full text
    Thesis