Search Results - (( project implementation max algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- project implementation »
- implementation max »
- data normalization »
- max algorithm »
- java »
-
1
A multidimensional data descriptor tool based on fuzzy min max neural network algorithm
Published 2018“…The techniques is in the Neural Network which has a few popular techniques such as K-Nearest Neighbour Fuzzy Min Max, general Reflex Fuzzy Min Max to get some idea of methodologies, algorithm, techniques and concept of the whole existing project and research study. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
2
Digital beamforming implementation of switch-beam smart antenna system by using integrated digital signal processor and field-programmable gate array
Published 2008“…After modeling, the algorithm is implemented in DSP. By using the Hardware- In-Loop facility of DSP, the comparison between hardware implementation and software modeling is performed. …”
Get full text
Get full text
Thesis -
3
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
4
WIMAX TESTBED
Published 2008“…This Final Year Project attempts to simulate via Simulink, the working mechanism of a WiMAX testbed that includes a transmitter, channel and receiver. …”
Get full text
Get full text
Final Year Project -
5
Designing and Developing an Intelligent Congkak
Published 2011“…and “Can Min-Max algorithm (MM) be speeded up by using NN as a forward-pruning method?”. …”
Get full text
Get full text
Get full text
Thesis -
6
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
7
Design of an OFDM transmitter and receiver using FPGA
Published 2004“…The main objective of this project is to design and implement a base band OFDM transmitter and receiver using FPGA. …”
Get full text
Get full text
Thesis -
8
Antenna design using left-handed materials
Published 2008“…After modeling, the algorithm is implemented in DSP by using C and Code Composer Studio. …”
Get full text
Get full text
Get full text
Monograph -
9
Antenna design using left-handed materials
Published 2008“…After modeling, the algorithm is implemented in DSP by using C and Code Composer Studio. …”
Get full text
Get full text
Get full text
Monograph -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
11
CPLD based controller for single phase inverters
Published 2007“…The involved software, hardware, and suitable algorithm to implement and generate the PWM are developed in details. …”
Get full text
Get full text
Thesis -
12
CPLD based controller for single phase inverters
Published 2007“…The involved software, hardware, and suitable algorithm to implement and generate the PWM are developed in details. …”
Get full text
Get full text
Thesis -
13
Predicting Chlorophyll Intensity Of Various Plants Using Improved Convolutional Neural Network
Published 2023“…Hence, in this project, a rapid and straightforward convolutional neural network (CNN) algorithm was proposed to predict chlorophyll intensity of various plant species based on leaf reflectance spectra. …”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
14
-
15
Face anti-spoofing using Convolutional Neural Networks / Siti Nurul Izzah Bahrain
Published 2024“…The problems that face anti-spoofing are the need for security enhancement, the lack of biometric authentication, and the system's vulnerabilities in manipulating facial detection. In this project, the Convolutional Neural Network (CNN) algorithm was implemented using TensorFlow in Python to detect fake face images. …”
Get full text
Get full text
Thesis -
16
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
17
Embedded Artificial Intelligent (AI) To Navigate Cart Follower
Published 2018Get full text
Get full text
Monograph -
18
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis
