Search Results - (( _ method study algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Application of genetic algorithm methods to optimize flowshop sequencing problem by Mohd Fadil, Md Sairi

    Published 2008
    “…Genetic algorithm method is methods that follow the natural concept. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    An experimental study of modified black hole algorithms by Mohammed, Suad Khairi

    Published 2018
    “…The BH algorithm is a population-based method which uses more than one agent to find a solution in a search space. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Route optimization using shortest path method / Muhamad Faisal Amin Shakri by Shakri, Muhamad Faisal Amin

    Published 2025
    “…Therefore, the effectiveness of route planning is very essential. The method to study route optimization is called shortest path method. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Breast cancer disease classification using fuzzy-ID3 algorithm with FUZZYDBD method: automatic fuzzy database definition by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2021
    “…This study identified that the combination of FID3 algorithm with FUZZYDBD method is reliable, robust and managed to perform well in breast cancer classification.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Comparing alternative methods for improving the bisection techniques: modified bracketing method and Regula Falsi Algorithm / Nurul Ain Syafika Juperi, Nur Yasmin Hanani Mahdiber a... by Juperi, Nurul Ain Syafika, Mahdiber, Nur Yasmin Hanani, Khairul Nizam, Amylia Natasha

    Published 2023
    “…This study was performed to compare alternative methods for improving the Bisection techniques which are Modified Bracketing Method and Regula Falsi Algorithm. …”
    Get full text
    Get full text
    Student Project
  8. 8

    Attribute related methods for improvement of ID3 Algorithm in classification of data: A review by Nur Farahaina, Idris, Mohd Arfian, Ismail

    Published 2020
    “…The objective of the study being conducted is to implement the attribute related methods to solve the shortcomings of the ID3 algorithm like the tendency to select attributes with many values and also improve the performance of ID3 algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A comparative study of evolutionary algorithms and adapting control parameters for estimating the parameters of a single-diode photovoltaic module's model by Muhsen D.H., Ghazali A.B., Khatib T., Abed I.A.

    Published 2023
    “…Algorithms; Diodes; Errors; Iterative methods; Least squares approximations; Mean square error; Optimization; Parameter estimation; Parameter extraction; Photovoltaic cells; Coefficient of determination; Differential Evolution; Electromagnetism-like algorithm; Hybrid evolutionary algorithm; Photovoltaic; Photovoltaic modules; Root mean square errors; Single-diode models; Evolutionary algorithms; algorithm; comparative study; electromagnetic method; estimation method; experimental design; numerical method; parameterization; performance assessment; photovoltaic system…”
    Article
  10. 10

    An improved method using fuzzy system based on hybrid boahs for phishing attack detection by Noor Syahirah, Nordin

    Published 2022
    “…Moreover, Butterfly Optimization Algorithm and Harmony Search Algorithm were combined as optimization method led to a new method named BOAHS. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Lexicon-based and immune system based learning methods in Twitter sentiment analysis by Jantan, Hamidah, Drahman, Fatimatul Zahrah, Alhadi, Nazirah, Mamat, Fatimah

    Published 2016
    “…The aim of this article attempts to study the potential of this method in text classification for sentiment analysis.This study consists of three phases; data preparation; classification model development using three selected Immune System based algorithms i.e. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Comparative study of methods for solving the Rubik’s Cube / Nur Syahirah Shuhaimi & Noor Fazlini Mustari by Shuhaimi, Nur Syahirah, Mustari, Noor Fazlini

    Published 2019
    “…Through this project, the study method of layer-by-layer human which are Fridrich and ZZ method are being applied. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods by Salih, Rawia Tahrir

    Published 2021
    “…In addition, the weight of importance is critical for evaluating the performance of MaOO algorithms. All evaluation studies for MaOO algorithms have ignored to assign such weight for the target criteria during evaluation process. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Whole brain radiation therapy verification using 2D gamma analysis method by Zainodin, Nik Nurul Afina Wan

    Published 2020
    “…The CC algorithm gave the passing rate of 87.25% using 3 mm/3% (DTA/DD) method than PB algorithm with 79.95%. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Load flow method using genetic algorithm by Lok, C. W., Zin, A. A. M., Mustafa, M. W., Lo, Kueiming Lun

    Published 2003
    “…Genetic algorithms (GAs) are search methods based on the natural selection and natural genetics, while power flow studies, commonly known as load flow, form an important part of power system analysis. …”
    Get full text
    Conference or Workshop Item
  17. 17

    Hybrid conjugate gradient methods using strong Wolfe line search for Whale Optimization Algorithm / Wan Nur Athirah Wan Mohd Zakirudin by Wan Mohd Zakirudin, Wan Nur Athirah

    Published 2023
    “…Based on the previous study, the LAMR coefficient is currently the best CG method under strong Wolfe line search. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Outlier detection in circular regression model using minimum spanning tree method by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari, Roslinazairimah, Zakaria

    Published 2019
    “…The existence of outliers in a circular regression model can lead to many errors, for example in inferences and parameter estimations. Therefore, this study aims to develop new algorithms that can detect outliers by using the minimum spanning tree method. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD by ABDULLAH, H., LAW BOON HUI, C., ZAKARIA, M. S.

    Published 2023
    “…Thus, in this study, an optimization of the sequence operation in machining was conducted using an Artificial Intelligence method, which is the Ant Colony algorithm. …”
    Get full text
    Get full text
    Article
  20. 20

    MINIMIZATION OF MACHINING PROCESS SEQUENCE BASED ON ANT COLONY ALGORITHM AND CONVENTIONAL METHOD by ABDULLAH, H., LAW BOON HUI, C., ZAKARIA, M. S.

    Published 2023
    “…Thus, in this study, an optimization of the sequence operation in machining was conducted using an Artificial Intelligence method, which is the Ant Colony algorithm. …”
    Get full text
    Get full text
    Article