Search Results - (( java application means algorithm ) OR ( data normalization _ algorithm ))
Search alternatives:
- data normalization »
- application means »
- java application »
- means algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This project will use fuzzy k-means clustering algorithm to cluster the data because it is easy to implement and have many advantages. …”
Get full text
Get full text
Thesis -
2
A web-based implementation of k-means algorithms
Published 2022“…The K-means algorithm has been around for over a century. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
-
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…This study aims to compare the performance of Boyer-Moore, Knuth morris pratt, and Horspool algorithms in searching for the meaning of words in the Java-Indonesian dictionary search application in terms of accuracy and processing time. …”
Get full text
Get full text
Journal -
5
Effect of normalization and effect of normalization and training algorithm on radial basis training algorithm on radial basis function network performance function network performa...
Published 2007“…To recognize the effect of normalization of data and training algorithm on Radial Basis Function (RBF) performance.…”
Get full text
Get full text
Conference or Workshop Item -
6
Mining Sequential Patterns using I-PrefixSpan
Published 2008Get full text
Get full text
Citation Index Journal -
7
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Get full text
Thesis -
8
Biometrics electronic purse
Published 1999“…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Anomaly detection algorithms model normal behavior. Anomaly detection models compare sensor data to normal patterns learned from the training data by using statistical method and try to detect activity that deviates from normal activity. …”
Get full text
Monograph -
11
An alternative approach to normal parameter reduction algorithms for decision making using a soft set theory / Sani Danjuma
Published 2017“…In addition, the algorithm was relatively easy to understand compare to the state of the art of normal parameter reduction algorithm. …”
Get full text
Get full text
Get full text
Thesis -
12
Pengkelasan Sel Kanser Pangkal Rahim Kepada Sel Normal Dan Tidak Normal Menggunakan Analisis Pembezalayan Dan Rangkaian Neural
Published 2006“…The system is built to classify some certain data into two classes, which are normal or abnormal cells. …”
Get full text
Get full text
Monograph -
13
Algorithm for calculation of cephalometric soft tissue facial traits
Published 2007“…The source data used to get 3D digital models of human soft tissues include CT data and 3D laser scanner data. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis -
15
Mining Sequential Patterns Using I-PrefixSpan
Published 2007Get full text
Get full text
Get full text
Conference or Workshop Item -
16
Classification of Cardiac Disorders Based on Electrocardiogram Data with Fuzzy Cognitive Map (FCM) Algorithm Approach
Published 2021“…This research contributes to the world of health, where we classify the Electrocardiogram (ECG) data, so that it can classify abnormal and normal cardiac disorders using the Fuzzy Cognitive Map (FCM) algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
17
Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer
Published 2023“…Consequently, to handle these data, computer algorithms must adapt to their characteristics. …”
Get full text
Get full text
Thesis -
18
Text messaging encryption system
Published 2012Get full text
Get full text
Undergraduates Project Papers -
19
Adaptive grid-meshed-buffer clustering algorithm for outlier detection in evolving data stream
Published 2023“…Existing clustering algorithms for outlier detection encounter significant challenges due to insufficient data pre-processing methods and the absence of a suitable data summarization framework for effective data stream clustering. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
Reference gene validation for gene expression normalization in canine osteosarcoma: a geNorm algorithm approach
Published 2017“…Previous gene expression studies involving canine OS have used one or two reference genes to normalize gene expression. This study aimed to validate a panel of reference genes commonly used for normalization of canine OS gene expression data using the geNorm algorithm. qPCR analysis of nine canine reference genes was performed on 40 snap-frozen primary OS tumors and seven cell lines. …”
Get full text
Get full text
Get full text
Article
