Search Results - (( pre processing force algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- processing force »
- force algorithm »
- pre processing »
- java »
-
1
Establishment of spectral subtraction-based algorithm for experimental modal analysis under operating condition
Published 2022“…Therefore, output response from the measurement requires a filtering process to suppress the response from operating forces and retain only the response from the artificially induced force. …”
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
5
Efficient and secured compression and steganography technique in wireless sensor network
Published 2016“…In terms of security, the proposed solution is studied against brute-force attacks and the analysis shows that the new algorithm can withstand this type of attack with an ample amount of hiding possibilities that make the process of retrieving the message extremely diffi- cult. …”
Get full text
Get full text
Get full text
Thesis -
6
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
7
ICS cyber attack detection with ensemble machine learning and DPI using cyber-Kit datasets
Published 2021“…The industrial datasets are pre-processed, profiled and the abnormality is analyzed with DPI. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
8
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Mobile Crowd Steering Evacuation Model via Agent Based Simulation by Applying the Social Force Model
Published 2025“…It overcomes the cost of capturing and pre-processing genuine crowd datasets. Famous simulation models include agent-based crowd guiding. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Camera geometry determination based on circular's shape for peg-in-hole task
Published 2019“…The peg-in-hole task is widely used in manufacturing process by using vision system and sensors. However, it requires complex algorithm and high Degree of Freedom (DOF) mechanism with fine movement. …”
Get full text
Get full text
Thesis -
11
Development Of Finite Element Codes For Shear Wall Analysis
Published 2008“…The multilayer shell and beam elements are available in the element library of this finite element program.Both above finite element codes are equipped with pre, post processing and animation graphic facilities. …”
Get full text
Get full text
Thesis
