Search Results - (( variable visualisation using algorithm ) OR ( java data normalization algorithm ))

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    ENGINEERING DESIGN WITH PSO ALGORITHM by MHD BASIR, SITI NUR HAJAR

    Published 2019
    “…It assists design engineers as it gives a clearer visualization to predict which value of the variables gives a best produced result. This dissertation will demonstrate the ability of PSO Algorithm in improving design areas by the use of recommendation system that helps engineering designers to visualise an optimal design.…”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4
  5. 5

    Predictors on outcomes of cardiovascular disease of male patients in Malaysia using Bayesian network analysis by Nurliyana Juhan, Yong Zulina Zubairi, Ahmad Syadi Mahmood Zuhdi, Zarina Mohd Khalid

    Published 2023
    “…Conclusions The data visualisation analysis can be a powerful tool to understand the relationships between the CVD prognostic variables and can be useful to clinicians.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Analysis of the dynamics of a vector-borne infection with the effect of imperfect vaccination from a fractional perspective by Tang T.-Q., Jan R., Khurshaid A., Shah Z., Vrinceanu N., Racheriu M.

    Published 2024
    “…On the other hand, vaccination, memory index or fractional order, and treatment could be used as efficient controlling variables. � 2023, Springer Nature Limited.…”
    Article
  8. 8

    Axis manipulation to solve Inverse Kinematics of Hyper-Redundant Robot in 3D Space by Annisa, Jamali, Sheldon Ijau, Winston

    Published 2022
    “…In this study, an axis manipulation using a geometrical approach is used. Initially, a general algorithm for a 2-m-link hyper-redundant robot in 3D is generated. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Bioinformatics analysis and spatiotemporal distribution of the f lic gene and its protein isolated from Escherichia coli-infected patients in Eastern Algeria by Harrar, Abdenassar, Awang Hamat, Rukman, Hamidechi, Mohamed Abdelhafid

    Published 2024
    “…The alignment results were then visualised using the MView programme. Finally, a phylogenetic tree was constructed using the maximum likelihood algorithm in MEGA 11 software. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Bioinformatics analysis and spatiotemporal distribution of the fliC gene and its protein isolated from Escherichia coli-infected patients in eastern Algeria by Harrar, Abdenassar, Hamat, Rukman Awang, Hamidechi, Mohamed Abdelhafid

    Published 2024
    “…The alignment results were then visualised using the MView programme. Finally, a phylogenetic tree was constructed using the maximum likelihood algorithm in MEGA 11 software. …”
    Get full text
    Get full text
    Get full text
    Article