Search Results - (( waste reduction method algorithm ) OR ( java data normalization algorithm ))

  • Showing 1 - 13 results of 13
Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Development of novel algorithm features in the modelling of cyclic processes by Choong, Thomas S.Y., Paterson, William R., Scott, David M.

    Published 2002
    “…The second feature of the algorithm is a reduction of the number of cycles required to reach the CSS while ensuring that the CSS is certainly determined. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6
  7. 7

    The effect of government policy on the relationship between organizational factors and construction waste management in Abuja, Nigeria by Nasidi, Yusuf

    Published 2016
    “…The study suggested that hazardous waste, time and overrun waste should also be considered; while case study or qualitative method could be adopted in future research.…”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Applying machine learning and particle swarm optimization for predictive modeling and cost optimization in construction project management by almahameed, Bader aldeen, Bisharah, Majdi

    Published 2024
    “…Particle Swarm Optimization (PSO) has demonstrated its efficacy in addressing the issue of construction waste reduction and enhancing the accuracy of cost estimation through the identification of optimal combinations of variables. …”
    Get full text
    Get full text
    Article
  10. 10

    The classification of FTIR plastic bag spectra via label spreading and stacking by Almanifi, Omair Rashed Abdulwareth, Ng, Jee Kwan, Anwar P. P., Abdul Majeed

    Published 2021
    “…Four pipelines were investigated, consisting of two machine learning algorithms, a stacked model that stacks the KNN, SVM and RF algorithms together, and Label spreading, as well as two different dimensionality reduction methods namely; SVD and UMAP. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…Two sets of experimental data involving 20 diabetic patients and 20 healthy subjects were collected from CITO laboratory Semarang Central Java, Indonesia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Snort-based smart and swift intrusion detection system by Olanrewaju, Rashidah Funke, Khan, Burhan Ul Islam, Najeeb, Athaur Rahman, Ku zahir, Ku Nor Afiza, Hussain, Sabahat

    Published 2018
    “…In this paper, a smart Intrusion Detection System (IDS) has been proposed that detects network attacks in less time after monitoring incoming traffic thus maintaining better performance. Methods/Statistical Analysis: The features are extracted using back-propagation algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13