Search Results - (( program among normalization algorithm ) OR ( java application force algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Dynamic force-directed graph with weighted nodes for scholar network visualization by Mohd. Aris, Khalid Al-Walid, Ramasamy, Chitra, Mohd Aris, Teh Noranis, Zolkepli, Maslina

    Published 2022
    “…The approach is realized by creating a web-based interface using D3 JavaScript algorithm that allows the visualization to focus on how data are connected to each other more accurately than the conventional lines of data seen in traditional data representation. …”
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Computer remote monitoring via mobile phones using socket programming / Samih Omer Fadlelmola Elkhider by Omer Fadlelmola Elkhider, Samih

    Published 2011
    “…The studies show beyond technical algorithms, physical aspects plays a big rule in client server model. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Neural network based model predictive control for a steel pickling process by Kittisupakorn, P., Thitiyasook, P., Hussain, Mohd Azlan, Daosud, W.

    Published 2009
    “…The baths exhibit the normal features of an industrial system such as nonlinear dynamics and multi-effects among variables. …”
    Get full text
    Get full text
    Article
  5. 5

    Development of MATLAB® GUI for infant cry signal analysis using FFT / Suzilawati Muhamud @ Kayat by Muhamud @ Kayat, Suzilawati

    Published 2008
    “…FFT analysis and Hilbert transformation were used to extract information embedded in both cry signals Algorithms and programming utilizing MATLAB R2007b were written to search for the fundamental frequency of each cry signal and to identify the type of signal uniquely according to its fundamental frequency. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Framework for pedestrian walking behaviour recognition to minimize road accident by Hashim Kareem, Zahraa

    Published 2021
    “…The results indicate the following: (1) From 262 samples, 66.80% and 48.10% of respondents use mobile phones for calling and chatting, respectively. (2) 263 samples of participants are obtained and analysed, and 90 features are extracted from each sample. (3) 100% classification accuracy are obtained for each class (normal walking, calling, chatting, and running) using the grid optimiser method in machine learning. (4) The precision of classification using Euclidean algorithm for normal walking and calling is 70%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Nearfield Electromagnetic Imaging Technique For Brain Tumour Detection by Eustacius Jude, Anak Joseph Linggong

    Published 2019
    “…Brain tumour is among the deadliest disease that is fatal if left untreated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Analyzing the cost-effectiveness of enhancement approaches for rehabilitating water distribution network by Abdel Rahman Mohamed Ismail, Farouk Abdel Mageed Rady

    Published 2021
    “…Then, Cronbach’s alpha, mean score ranking, normalization value, and agreement analysis were carried in the data analysis phase. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A multi-filter feature selection in detecting distributed denial-of-service attack by Yon, Yi Jun, Leau, Yu-Beng, Suraya Alias, Park, Yong Jin

    Published 2019
    “…Flash crowd attack is the most challenging problem among the attacks which targeting the web server during the Flash Events (FEs). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item