Search Results - (( java application customization algorithm ) OR ( _ normalization research algorithm ))

Refine Results
  1. 1

    An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma by Sani , Danjuma

    Published 2017
    “…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Algorithm for calculation of cephalometric soft tissue facial traits by Azam Rana, Mohammad, Setan, Halim, Majid, Zulkepli, Chong, Albert K.

    Published 2007
    “…Up to now Malaysia does not have any source for normal trait values of human face. This algorithm can be used to calculate facial traits for building a nationwide database that can be used to compare normal traits with abnormal ones and then plan the surgery procedures. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
    Get full text
    Monograph
  7. 7
  8. 8

    Improved normalization and standardization techniques for higher purity in K-means clustering by Dalatu, Paul Inuwa, Fitrianto, Anwar, Mustapha, Aida

    Published 2016
    “…Clustering is an unsupervised classification method with aim of partitioning, where objects in the same cluster are similar, and objects belong to different clusters vary significantly, with respect to their attributes. The K-means algorithm is a famous and fast technique in non-hierarchical cluster algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    The normalized random map of gradient for generating multifocus image fusion by Ismail, ., Kamarul Hawari, Ghazali

    Published 2020
    “…This data has a significant role in predict the initial focus regions. The proposed algorithm successes to supersede difficulties of mathematical equations and algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Electroencephalography Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Mohamed, Shakir, Qidwai, Uvais, Malik, Aamir Saeed, Kamel , Nidal

    Published 2015
    “…Unlike the commercial ECG simulators, to the best of our knowledge, there is no such commercially available system that can be used for such research tasks. With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Article
  12. 12

    Non-invasive pathological voice classifications using linear and non-linear classifiers by Hariharan, Muthusamy

    Published 2010
    “…Two types of experiments are conducted using the proposed feature extraction and classification algorithms. In the first experiment, classification of normal and pathological voice has been investigated. …”
    Get full text
    Thesis
  13. 13

    Improving Channel Assignment for Vehicular Ad-hoc Sensor Network in Disaster Management System by Chiu Shoon, Sia

    Published 2024
    “…This research shows that packet loss has a more significant influence when measured over the proposed methods and algorithms, as well as delay and energy consumption during the evaluation stage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Classification of Cardiac Disorders Based on Electrocardiogram Data with Fuzzy Cognitive Map (FCM) Algorithm Approach by Sumiati, ., Hoga, Saragih, T.K.A, Rahman, Viktor Vekky, Ronald Repi, Agung, Triayudi

    Published 2021
    “…Meanwhile, the re�sult of abnormal heart convergence process has the lowest convergence value of 0.49 and the highest convergence value of 0.87. This research contributes to the world of health, where we classify the Electrocardiogram (ECG) data, so that it can classify abnormal and normal cardiac disorders using the Fuzzy Cognitive Map (FCM) algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    An improved recommender system based on normalization of matrix factorization and collaborative filtering algorithms by Zahid, Aafaq

    Published 2015
    “…Therefore, this research is dedicated to combining the normalization technique with neighborhood models (CF and MF) to produce CF+N (collaborative filtering and normalization) and MF+N (matrix factorization and normalization). …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Comparing means of two non-homogeneous normal populations by Abd Rahman, Mohd Nawi

    Published 1986
    “…However, it can be attractive to many if some efficient algorithm is available. This paper intends to give an alternative approach for testing the means of two normal populations having unequal variances but whose coefficient of variations are homogeneous. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    EEG Simulation Hardware for Realistic Seizure, Preseizure and Normal Mode Signal Generation by Shakir, Mohamed, Qidwai, Uvais, Malik, Aamir Saeed, Kamel, Nidal

    Published 2015
    “…Unlike the commercial ECG simulators, to the best of our knowledge, there is no such commercially available system that can be used for such research tasks. With controlled data types, healthy/normal, seizure and pre-seizure classes, tuning of algorithms for detection and classification applications can be attained. …”
    Get full text
    Get full text
    Citation Index Journal
  20. 20

    Adaptive policing and shaping algorithms on inbound traffic using generalized Pareto distribution / Nor Azura Ayop by Ayop, Nor Azura

    Published 2016
    “…Log likelihood estimation technique is used to fit the best 2-parameter CDF compared to Weibull, Normal and Rician distribution model. The percentage level 5% under original bandwidth used is developed on policing and shaping algorithms to control bandwidth used. …”
    Get full text
    Get full text
    Thesis