Search Results - (( (variable OR variables) extractions using algorithm ) OR ( java application using algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Obfuscation involves transforming potentially revealing data, renaming useful classes and variables (identifiers) names to meaningless labels or adding unused or meaningless code to an application binary. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Classification for large number of variables with two imbalanced groups by Ahmad Hakiim, Jamaluddin

    Published 2020
    “…This study proposed two algorithms of classification namely Algorithm 1 and Algorithm 2 which combine resampling, variable extraction, and classification procedure. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Strategies of Handling Different Variables Reduction for LDA by Hamid, Hashibah, Mahat, Nor Idayu

    Published 2012
    “…Meanwhile, principal component analysis is used to extract important information from the original variables. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Optimized clustering with modified K-means algorithm by Alibuhtto, Mohamed Cassim

    Published 2021
    “…Clustering technique is able to find hidden patterns and to extract useful information from huge data. Among the techniques, the k-means algorithm is the most commonly used technique for determining optimal number of clusters (k). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Optimal timber transportation planning in tropical hill forest using bees algorithm by Jamaluddin, Jamhuri

    Published 2022
    “…The model uses grid cell-sized 10 m x 10 m characterised with timber locations, volume and fixed and variable costs to represent the study area. …”
    Get full text
    Get full text
    Thesis
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
    Get full text
    Get full text
    Final Year Project
  8. 8

    Prediction of electronic cigarette and vape use among Malaysian: decision tree analysis by Kartiwi, Mira, Ab Rahman, Jamalludin, Nik Mohamed, Mohamad Haniki, Draman, Samsul, Ab Rahman, Norny Syafinaz

    Published 2017
    “…Results: By using the ID3 algorithm, it is possible to consider the relationship among variables and to identify the most informative variables for predicting the classification of the instance. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9
  10. 10

    Coronary artery stenosis detection and visualization / Tang Sze Ling by Tang, Sze Ling

    Published 2015
    “…The performance evaluation results show that the stenosis detection algorithm performs better average sensitivity than several state-of-the-art algorithms.…”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Characteristics of electronic cigarette and vape users in Malaysia: Lessons from decision tree analysis by Kartiwi, Mira, Nik Mohamed, Mohamad Haniki, Ab Rahman, Jamalludin, Draman, Samsul, Ab Rahman, Norny Syafinaz

    Published 2020
    “…Several predictor variables included in this study were: seven demographics variables (i.e., age, gender, race, residence, marital, occupation and education) and twenty variables on the perception of ECV use. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Development of an effective clustering algorithm for older fallers by Goh, Choon Hian, Wong, Kam Kang, Tan, Maw Pin *, Ng, Siew Cheok, Chuah, Yea Dat, Kwan, Ban Hoe

    Published 2022
    “…Using feature extraction with the t-SNE and the K-means clustering algorithm, subjects were clustered into low, intermediate A, intermediate B and high fall risk groups which corresponded with fall occurrence of 13%, 19%, 21% and 31% respectively. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17
  18. 18

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    The Estimation of Air Temperature from NOAA/AVHRR Images and the study of NDVI-Ts impact by Matori, A.N, Hassaballa, A. Haleem

    Published 2011
    “…From the brightness temperature in the images thermal bands 4&5 and using ε the surface temperature Ts was extracted using three different split-window algorithms. …”
    Get full text
    Get full text
    Article
  20. 20

    Analyzing The Potential Of Genetic Algorithm For Maximum Power Point Tracking In Wind Energy Conversion System In Malaysia by Nasrullah Bin Isnin

    Published 2023
    “…A genetic algorithm is used to further optimised the control strategy by finding the optimised variable for the controller. …”