Search Results - (( java application modified algorithm ) OR ( variable extraction max algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1
  2. 2

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Classification of compressive strength grades for lightweight aggregate concrete with palm oil fuel ash (POFA) using kNearest Neighbour (k-NN) by Mohamad Hushnie, Haron, Nur Azzimah, Zamri, Khairunisa, Muthusamy

    Published 2023
    “…The data from this process were first transformed using min-max normalization and then, analysed using exploratory and descriptive analysis to discover patterns between input variables and concrete grades. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Classification of compressive strength grades for lightweight aggregate concrete with palm oil fuel ash (POFA) using k-Nearest Neighbour (k-NN) by Mohamad Hushnie, Haron, Nur Azzimah, Zamri, Khairunisa, Muthusamy

    Published 2023
    “…The data from this process were first transformed using min-max normalization and then, analysed using exploratory and descriptive analysis to discover patterns between input variables and concrete grades. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Modelling the Species Distribution of Flat-Headed Cats (Prionailurus planiceps), an Endangered South-East Asian Small Felid by Wilting, Andreas, Cord, Anna, Hearn, Andrew J., Hesse, Deike, Mohamed, Azlan, Traeholdt, Carl, Cheyne, Susan M., Sunarto, Sunarto, Mohd-Azlan, J., Ross, Joanna, Shapiro, Aure´ lie C., Sebastian, Anthony, Dech, Stefan, Breitenmoser, Christine, Sanderson, Jim, Duckworth, J. W., Hofer, Heribert

    Published 2010
    “…Methodology/Principal Findings: In this study, we designed a predictive species distribution model using the Maximum Entropy (MaxEnt) algorithm to reassess the potential current distribution and conservation status of the flat-headed cat. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Automated diagnosis of diabetes using entropies and diabetic index by Acharya, U.R., Fujita, H., Bhat, S., Koh, J.E.W., Adam, M., Ghista, D.N., Sudarshan, V.K., Chua, K.P., Chua, K.C., Molinari, F., Ng, E.Y.K., Tan, R.S.

    Published 2016
    “…These redundant features are eliminated by using six feature selection algorithms: Student's t-test, Receiver Operating Characteristic Curve (ROC), Wilcoxon signed-rank test, Bhattacharyya distance, Information entropy and Fuzzy Max-Relevance and Min-Redundancy (MRMR). …”
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Machine-learning approach using thermal and synthetic aperture radar data for classification of oil palm trees with basal stem rot disease by Che Hashim, Izrahayu

    Published 2021
    “…The temperature variation for each thermal image was examined using FLIR ResearchIR Max, the camera manufacturer's software, and feature extraction for each thermal image was extracted using FLIR Tools in the FLIR ResearcherIR environment software. …”
    Get full text
    Get full text
    Thesis