Search Results - (( java application using algorithm ) OR ( (variable OR variables) extractions from algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Optimal timber transportation planning in tropical hill forest using bees algorithm by Jamaluddin, Jamhuri

    Published 2022
    “…The model uses grid cell-sized 10 m x 10 m characterised with timber locations, volume and fixed and variable costs to represent the study area. Cells with timbers were assigned as -from node, and the model finds the following cells simultaneously on the extraction technique selection and forest road network. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Strategies of Handling Different Variables Reduction for LDA by Hamid, Hashibah, Mahat, Nor Idayu

    Published 2012
    “…The technique is proposed to choose useful variables that give minimum error rate on LDA. Meanwhile, principal component analysis is used to extract important information from the original variables. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Development Of Fall Risk Clustering Algorithm In Older People by Wong, Kam Kang

    Published 2020
    “…A total of 1279 subjects and 9 variables from dataset (1411 subjects and 139 variables) are selected for clustering. t-Distributed Stochastic Neighbour Embedding (t-SNE) for feature extraction and K-means clustering algorithm achieved the highest performance in clustering, which grouping the subjects into Low (13%), Intermediate A (19%), Intermediate B (21%) and High (31%) fall risk group. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…Third, a stenosis detection algorithm from two images is proposed in this thesis. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…In dealing with correlated variables, PCA was embedded in the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  9. 9
  10. 10

    Prediction of electronic cigarette and vape use among Malaysian: decision tree analysis by Kartiwi, Mira, Ab Rahman, Jamalludin, Nik Mohamed, Mohamad Haniki, Draman, Samsul, Ab Rahman, Norny Syafinaz

    Published 2017
    “…Results: By using the ID3 algorithm, it is possible to consider the relationship among variables and to identify the most informative variables for predicting the classification of the instance. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Characteristics of electronic cigarette and vape users in Malaysia: Lessons from decision tree analysis by Kartiwi, Mira, Nik Mohamed, Mohamad Haniki, Ab Rahman, Jamalludin, Draman, Samsul, Ab Rahman, Norny Syafinaz

    Published 2020
    “…Materials and Methods: A number of simulations was carried out on the dataset which was extracted from the National Electronic Cigarette Survey (NECS) 2016. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…The purpose of this study was, therefore, to develop a clustering-based algorithm to determine falls risk. Data from the Malaysian Elders Longitudinal Research (MELoR), comprising 1411 subjects aged ≥55 years, were utilized. …”
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…Firstly, a multi-objective feature selection approach is developed in this study to extract the most influential subsets of input variables from each historical data type (EEC and SEI) with maximum relevancy and minimum redundancy for long-term EEC modeling. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    The Estimation of Air Temperature from NOAA/AVHRR Images and the study of NDVI-Ts impact by Matori, A.N, Hassaballa, A. Haleem

    Published 2011
    “…From the brightness temperature in the images thermal bands 4&5 and using ε the surface temperature Ts was extracted using three different split-window algorithms. …”
    Get full text
    Get full text
    Article
  18. 18

    Linear regression convolutional neural network for fully automated coronary lumen segmentation in intravascular optical coherence tomography / Yong Yan Yin by Yong, Yan Ling

    Published 2018
    “…In addition, an inter-observer variability test was performed and has shown that the proposed algorithm has comparable variability against manual luminal area estimations by expert human observers. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance by Nor Azlan, Nor Asmaa Alyaa

    Published 2021
    “…Whereas, the validation from the real-world of the two datasets showed that the new augmentation algorithm steadily producing lesser iteration number compared to the conventional Simplex, QSM and BLSA algorithms. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Evaluation and Comparative Analysis of Feature Extraction Methods on Image Data to increase the Accuracy of Classification Algorithms by Rachmad, Iqbal, Tri Basuki, Kurniawan, Misinem, ., Edi Surya, Negara, Tata, Sutabri

    Published 2024
    “…It involves identifying and isolating relevant information from the images that classification algorithms can use to distinguish between different fruit categories. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article