Search Results - (( java application a algorithm ) OR ( data normalization ((path algorithm) OR (_ algorithm)) ))
Search alternatives:
- data normalization »
- java application »
- path algorithm »
- application a »
- a algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
Wide area measurement system in the IEEE-14 bus system using multiobjective shortest path algorithm for fault analysis
Published 2021“…The distances of the normal path (without simulated fault) and the new path (with simulated fault) were recorded. …”
Get full text
Get full text
Get full text
Article -
3
-
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…One of the solutions is to have a security application implemented in mobile phone device. …”
Get full text
Get full text
Conference or Workshop Item -
5
Improved Dynamic Ant Colony System (DACS) on Symmetric Traveling Salesman Problem (TSP).
Published 2007“…Their ability as a colony to find paths or routes to the food sources has inspired the development of an algorithm namely Ant Colony System (ACS). …”
Get full text
Get full text
Conference or Workshop Item -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
7
Improving Network Consistency and Data Availability Using Fuzzy C Mean Clustering Algorithm in Wireless Sensor Networks
Published 2024thesis::doctoral thesis -
8
Deadline guarantee for scientific workflow using dynamic scheduling algorithms on IaaS clouds
Published 2018“…We will conduct a simulation experiment of scientific workflow algorithms with both of the algorithms mentioned above. …”
Get full text
Get full text
Thesis -
9
A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm
Published 2015“…The notion of characteristic profiles for the calibration of the model is also coherent with the application of equivalent fatigue loading in generating experimental data for calibration. The model is simple in application with the use of genetic algorithm for model calibration making use of only the material fatigue limit. …”
Get full text
Get full text
Thesis -
10
Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System
Published 2024“…Moreover, an average of 22.91% for LTE-AIC with respect to normal LTE-A and 38.63% compared to LTE for high data rate. …”
Get full text
Get full text
Get full text
Thesis -
11
Intelligent motion planning of a mobile robot by using convolutional neural network / Siti Asmah Abdullah
Published 2019“…By the path reference created by A* algorithm the robot is capable in optimizing its path to reach the designated destination. …”
Get full text
Get full text
Get full text
Thesis -
12
Modeling and multi-objective optimal sizing of standalone photovoltaic system based on evolutionary algorithms
Published 2020“…A new mutation vector inspired by the two-opposite path (2-Opt) algorithm with adaptive mutation scalar (F ) and crossover rate (CR) control parameters were employed to enhance the exploration and exploitation phases of the proposed algorithm. …”
Get full text
Get full text
Thesis -
13
Dynamics and control of underactuated systems with applications in robotics / Ahmad Azlan Mat Isa … [et al.]
Published 2011“…An ANN modal was trained using the experimentally obtained data and then used to predict the path of the passive joint that is positioned by the dynamic coupling of the active joint. …”
Get full text
Get full text
Research Reports -
14
Investigating the reliability of machine learning algorithms as an advanced tool for ozone concentration prediction
Published 2023“…The hybrid technique has been developed by using deep learning algorithms with the structure of multiple layers (with several neurons) of CNN and LSTM. …”
text::Thesis -
15
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
16
A smart marker-based indoor navigation system
Published 2024“…The proposed system also employs algorithms to calculate the shortest path for navigation and estimate the user position for localization when the user scans a marker. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
-
18
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
19
-
20
Magnetic resonance imaging sense reconstruction system using FPGA / Muhammad Faisal Siddiqui
Published 2016“…Furthermore, variable databus widths are used in the data path of the proposed architecture, which leads to reducing the hardware cost and silicon area. …”
Get full text
Get full text
Get full text
Thesis
