Search Results - (( programming grade detection algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- data normalization »
- programming grade »
- grade detection »
- java »
-
1
Tracking student performance in introductory programming by means of machine learning
Published 2023Conference Paper -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
3
Forward-Backward Time Stepping with Automated Edge-preserving Regularization Technique for Wood Defects Detection
Published 2019“…The FBTS integrated with automated edge-preserving regularization algorithm is implemented in C++ programming language executed in parallel computing. …”
Get full text
Get full text
Thesis -
4
ANN-based mango external quality grading system
Published 2017“…There are several types of algorithms that have been used to extract the features of fruit characters based on the physical parameters by capturing the fruit image and from the extracted information, those samples (mango fruit) will be detected, graded and sorted accordingly to the desired quality. …”
Get full text
Get full text
Get full text
Proceeding Paper -
5
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
6
AUTOMATED SCORING FOR SCALINESS OF PSORIASIS LESIONS USING EDGE DETECTION
Published 2007Get full text
Get full text
Final Year Project -
7
-
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
9
Database encryption for a Web-based Claims System
Published 2008“…On the other hand, the analysis of encryption algorithms with Web browsers, the results have shown that Twofish algorithm is best suited to the system that has been developed using ASP Web programming language on Internet Explorer. …”
Get full text
Thesis -
10
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
11
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
A reliable time base routing framework with seamless networking operation for SDN / Nauman Khan
Published 2024“…It is framed as a mixed-integer linear programming problem. To address this complexity, this work presents a multi-objective heuristic algorithm in the framework with the help of other module inputs that efficiently determines the best path for upcoming affected flows and timely isolates the maintenance switch except for the critical switch. …”
Get full text
Get full text
Get full text
Thesis
