Search Results - (( variable normalization techniques algorithm ) OR ( java application testing algorithm ))*
Search alternatives:
- normalization techniques »
- variable normalization »
- application testing »
- testing algorithm »
- java application »
-
1
Taguchi?s T-method with Normalization-Based Binary Bat Algorithm
Published 2025“…Therefore, a variable selection technique using a swarm-based Binary Bat algorithm is proposed. …”
Conference paper -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Weather prediction in Kota Kinabalu using linear regressions with multiple variables
Published 2021“…The root mean square error is used to compare the performance of the algorithms. The findings showed that the normal equation technique anticipates the weather with a high degree of accuracy, but the gradient descent technique predicts the low degree of accuracy.…”
Get full text
Get full text
Get full text
Get full text
Proceedings -
4
An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms
Published 2015“…It is concluded that the resultant hybrid techniques can perform well if the variables provided to normalization by neighborhood model (MF and CF) do not have big differences in order for the hybrid normalization model to outperform every algorithm in comparison.…”
Get full text
Get full text
Thesis -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
6
Comparing means of two non-homogeneous normal populations
Published 1986“…The statistic is shown to be a one-degree chi-square variable. An application on the proposed technique using an experimental data is given.…”
Get full text
Get full text
Get full text
Article -
7
Fault diagnostic algorithm for precut fractionation column
Published 2004“…The discriminator for the detection section is developed by using statistical techniques, where the control limits for each selected monitoring variable were represented in 'High', 'Normal', and 'Low' discrete. …”
Get full text
Get full text
Conference or Workshop Item -
8
Online handwritten signature recognition by length normalization using up-sampling and down-sampling
Published 2015“…In this paper, we introduce an efficient algorithm for online signature length normalization by using Up-Sampling and Down-Sampling techniques. …”
Get full text
Get full text
Article -
9
Enhancing Model Selection Based On Penalized Regression Methods And Empirical Mode Decomposition
Published 2021“…The penalized regularization methods are statistical techniques used to regularize and select the necessary predictor variables that have substantial effects on the response variable. …”
Get full text
Get full text
Thesis -
10
-
11
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Determination of tree stem volume : A case study of Cinnamomum
Published 2013“…Illustrations and algorithms are incorporated into the procedures. Non-normal and nonlinear data variables are addressed, hence data characterization is presented. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
-
18
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
19
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
20
CAT CHAOTIC GENETIC ALGORITHM BASED TECHNIQUE AND HARDWARE PROTOTYPE FOR SHORT TERM ELECTRICAL LOAD FORECASTING
Published 2017“…The correlation analysis is used for the identification and selection of the most influential input variable vector (IVV). The proposed model is tested for small and large size grid data, integrated with photovoltaic sources under normal and fluctuating load demand conditions and seasonal variations. …”
Get full text
Get full text
Thesis
