Search Results - (( (practices OR practice) selection based algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3
  4. 4

    A study of feature selection algorithms for predicting students academic performance by Zaffar, M., Savita, K.S., Hashmani, M.A., Rizvi, S.S.H.

    Published 2018
    “…In the light of this mentioned fact, it is necessary to choose a feature selection algorithm carefully. This paper presents an analysis of the performance of filter feature selection algorithms and classification algorithms on two different student datasets. …”
    Get full text
    Get full text
    Article
  5. 5

    A study of feature selection algorithms for predicting students academic performance by Zaffar, M., Savita, K.S., Hashmani, M.A., Rizvi, S.S.H.

    Published 2018
    “…In the light of this mentioned fact, it is necessary to choose a feature selection algorithm carefully. This paper presents an analysis of the performance of filter feature selection algorithms and classification algorithms on two different student datasets. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    The development of deformable bodies collision response algorithm for interactive virtual environment by Mohd. Shuaib, Norhaida, Bade, Abdullah, Daman, Daut, Sunar, Mohd. Shahrizal

    Published 2006
    “…It is an optimization algorithm that selects small areas for deformation processing based on equilibrium state. …”
    Get full text
    Get full text
    Monograph
  9. 9

    An expert knowledge based decommissioning alternative selection system for fixed oil and gas assets in the South China Sea by Na, K.L., Lee, H.E., Liew, M.S., Wan Abdullah Zawawi, N.A.

    Published 2017
    “…This work develops a knowledge based advisory expert system to address the late-life structural ambiguity of fixed jacket platforms in the selection of a best practicable decommissioning method. …”
    Get full text
    Get full text
    Article
  10. 10

    Developing best practice guidelines for oral cancer management in Malaysia / Aznilawati Abdul Aziz by Aznilawati, Abdul Aziz

    Published 2017
    “…An evidence-based practice guideline can be used as a decision guide for oral cancer teams and cancer patients in selecting the best option of oral cancer care. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Automated model selection for corporation credit risk assessment using machine learning / Zulkifli Halim by Halim, Zulkifli

    Published 2023
    “…This study has proposed an automated model selection based on the exhaustive search algorithm—that caused the timeout and memory leak issues. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Investigation of relaxation factor in landweber iterative algorithm for electrical capacitance tomography by Tian, Wenbin, Ramli, Mimi Faisyalini, Yang, Wuqiang, Sun, Jiangtao

    Published 2020
    “…It is crucial to select a suitable relaxation factor in iterative image reconstruction algorithms (e.g. …”
    Get full text
    Get full text
    Article
  14. 14

    Real-Time Video Processing Using Native Programming on Android Platform by Saipullah, Khairul Muzzammil

    Published 2012
    “…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15
  16. 16

    AI recommendation penetration testing tools for password attacks: random forest by Rozman, Nurulasyiqin, Saad, Shahadan

    Published 2025
    “…This project developed an AI-based recommendation system using the Random Forest algorithm to address the complexities of selecting appropriate penetration testing tools for password attacks. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Dose verification procedures in radiotherapy by Zakaria, Ahmad, Idris, Nik Rusman Nik

    Published 1999
    “…In radiotheraphy the accuracy of the radiation dose to be delivered to patient is vital.In the current practice the dose to be delivered by the treatment machine is calculated using computer planning system which utilised computational algorithms based on mathematical model that takes into account the shape of treatment beam, target geometry and tissue inhomogeneities present in the patient. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis