Search Results - (( (variable OR variables) evaluation case algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing by S. Ahmed, Bestoun

    Published 2011
    “…Recently, researchers have started to explore the use of Artificial Intelligence (AI)-based algorithms as t-way (where t indicates the interaction strength) and variable-strength testing strategies. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation by Kamal Z., Zamli, Ahmed, Bestoun S., Mahmoud, Thair, Afzal, Wasif

    Published 2018
    “…We detail the design of this combined algorithm and evaluate it through experiments on multiple synthetic and benchmark problems. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  4. 4

    A MODIFIED PARTICLE SWARM OPTIMIZATION ALGORITHM FOR WELLBORE TRAJECTORY DESIGN by BISWAS, KALLOL

    Published 2021
    “…During the optimization, the operational constraints of a wellbore such as true vertical depth and casings along with the bounds of tuning variables were utilized. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission by Ahmad Suki, Che Mohamed Arif

    Published 2011
    “…It is designed based on the Shaped VBR (SVBR) algorithm and was implemented in the Network Simulator 2 (ns-2). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Comparing three methods of handling multicollinearity using simulation approach by Adnan, Norliza

    Published 2006
    “…The algorithm is described and for the purpose of comparing the three methods, simulated data sets where the number of cases was less than the number of observations were used. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Optimal Weighted Learning of PCA and PLS for Multicollinearity Discriminators and Imbalanced Groups in Big Data (S/O: 13224) by Mahat, Nor Idayu, Engku Abu Bakar, Engku Muhammad Nazri, Zakaria, Ammar, Mohd Nazir, Mohd Amril Nurman, Misiran, Masnita

    “…This study developed an algorithm for statistical classification that enable ones to classify a future data to one of predetermined groups based on the measured data which facing two major threats; (i) multicollinearity among the measured variables and (ii) imbalanced groups. …”
    Get full text
    Get full text
    Monograph
  10. 10
  11. 11

    A Comparative Analysis of Peak Load Shaving Strategies for Isolated Microgrid Using Actual Data by Rana, M.M., Rahman, A., Uddin, M., Sarkar, M.R., Shezan, S.A., Ishraque, M.F., Rafin, S.M.S.H., Atef, M.

    Published 2022
    “…This paper presents a comparative analysis of a categorical variable decision tree algorithm (CVDTA) with the most common peak shaving technique, namely, the general capacity addition technique, to evaluate the peak shaving performance for an IMG system. …”
    Get full text
    Get full text
    Article
  12. 12

    Optimum MV Feeder Routing and Substation siting and rating in Distribution Network by Hasan, Ihsan Jabbar, Ab Ghani, Mohd Ruddin, Gan, Chin Kim

    Published 2014
    “…The proposed algorithm evaluates on the distribution network case with 164 load blocks. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A Comparative Study On Some Methods For Handling Multicollinearity Problems by Adnan, Norliza, Ahmad, Maizah Hura, Adnan, Robiah

    Published 2006
    “…The algorithm is described and for the purpose of comparing the three methods, simulated data sets where the number of cases were less than the number of observations used. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A comparative study on some methods for handling multicollinearity problems by Adnan, Norliza, Ahmad, Maizah Hura, Adnan, Robiah

    Published 2006
    “…The algorithm is described and for the purpose of comparing the three methods, simulated data sets where the number of cases were less than the number of observations used. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…Slower gait, poorer balance, weaker muscle strength, presence of cardiovascular disorder, poorer cognitive performance, and advancing age were the key variables identified. The proposed fall risk clustering algorithm grouped the subjects according to features. …”
    Get full text
    Get full text
    Article
  16. 16
  17. 17
  18. 18
  19. 19

    Dynamic Probability Selection for Flower Pollination Algorithm based on Metropolis-hastings Criteria by Zamli, Kamal Zuhairi, Din, Fakhrud, Nasser, Abdullah, Ramli, Nazirah, Mohamed, Noraini

    Published 2021
    “…Flower Pollination Algorithm (FPA) is a relatively new meta-heuristic algorithm that adopts its metaphor from the proliferation role of flowers in plants. …”
    Get full text
    Get full text
    Article
  20. 20

    Development of committee machine models for multiple response optimization problems by Golestaneh, Seyed Jafar

    Published 2014
    “…The results represent Global Desirability of proposed algorithm is equal or higher than GD of case studies. …”
    Get full text
    Get full text
    Thesis