Search Results - (( programming priority detection algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- programming priority »
- priority detection »
- data normalization »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…The higher the dissimilarity value, the higher the probability of detecting new faults. Previous research has used Jaccard Distance to measure the distance to prioritize test cases with the same priority value. …”
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Prioritizing event sequences test cases based on faults
Published 2018“…Weighted priority has been applied to assign a weight for each test case. …”
Get full text
Get full text
Get full text
Article -
8
Oil Palm Yield Data Collection Using Image Processing
Published 2021“…The tools used in training the ANN is the TensorFlow Object Detection API. There are many algorithms in the Object Detection API and three common methods, Faster R-CNN, SSD and YOLO are reviewed for their suitability in object detection. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
10
New synchronization protocol for distributed system with TCP extension
Published 2013“…These results show that the proposed algorithm, on average, has 7.97% higher fault-tolerance. …”
Get full text
Get full text
Thesis -
11
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis
