Search Results - (( variable virtualization technique algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- virtualization technique »
- normalization algorithm »
- data normalization »
- variable »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
4
A Review of Multi-criteria Decision-Making Methods Using Application of Variable Weight Theory and IF-TOPSIS-EF
Published 2021“…This paper represents the methodology to conduct a research that aims to combine two methods (IFS-TOPSIS-exponential based and Variable Weight Theory) in a new technique that tackles the abovementioned gaps by following induction research approach to validate the new technique by utilizing the secondary data, then to use interviews to develop the mobile application algorithm to perform solving MCDM problems virtually.…”
Get full text
Get full text
Get full text
Book Chapter -
5
Modeling of cupping suction system based on system identification method
Published 2022“…For instance, the input of hairy surface was virtually identical to the actual output at 90.75 %. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
Development of a phantom and metal artifact correction (MAC) algorithm for post-operative spine computed tomography (CT) imaging / Noor Diyana Osman
Published 2014“…The MAC algorithm was developed in MATLAB environment and was applied on virtual sinogram which directly computed through forward projection of CT images. …”
Get full text
Get full text
Thesis -
10
Revolutionizing video analytics: a review of action recognition using 3D
Published 2024“…Researchers have contributed novel techniques, architecture, and datasets in an attempt to advance the fiel…”
Get full text
Get full text
Article -
11
Machine learning model to predict the contact of angle using mineralogy, TOC and process parameters in shale
Published 2021“…© EAGE Asia Pacific Virtual Geoscience Week 2021. All rights reserved.…”
Get full text
Get full text
Conference or Workshop Item -
12
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
Get full text
Get full text
Get full text
Get full text
Thesis
