Search Results - (( code application maximization algorithm ) OR ( java adaptation optimization algorithm ))

Refine Results
  1. 1
  2. 2

    Static code analysis of permission-based features for android malware classification using apriori algorithm with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2015
    “…In this method, permission-based features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Android Malware classification using static code analysis and Apriori algorithm improved with particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2014
    “…In this method, features were extracted from Android applications byte-code through static code analysis, selected and were used to train supervised classifiers. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  4. 4

    Reusability techniques in load-flow analysis computer program by Nor, K.M., Mokhlis, Hazlie, Gani, T.A.

    Published 2004
    “…These methodologies made the developed load-flow analysis software flexible for future enhancement. Adding and changing codes and algorithm of the software can be done without affecting much the existing codes and algorithms. …”
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    Block based low complexity iterative QR precoder structure for Massive MIMO by Mok, Li Suet

    Published 2021
    “…We also study one of the suboptimal pre-coding solutions known as Block-diagonalization (BD) applicable in the case where a receiver has multiple antennas and compare their performance. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8
  9. 9
  10. 10

    Efficient mobile video transmission based on a joint coding scheme by Azni, Mohamed, Boudjadja, Rima, Dahmani, Abdelnasser, Zennir, Mohamed Nadjib

    Published 2017
    “…In this paper, we propose a joint coding design which uses the Symbol Forward Error Correction (S-FEC) at the application layer. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Power improvement of solar photovoltaic (PV) based on maximum power point tracking (MPPT) controller / Siti Munirah Ahmad Saad by Siti Munirah, Ahmad Saad

    Published 2018
    “…This MPPT using perturb and observe algorithm, the algorithm are general algorithm and use as a code. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Dynamic transmit antenna shuffling scheme for hybrid multiple-input multiple-output in layered architecture by Chong, Jin Hui

    Published 2010
    “…Finally, the performance of V-BLAST/STBC transceiver scheme with proposed LC-QR algorithm is compared with other MIMO systems, such as V-BLAST and orthogonal space-time block codes. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Improved Malware detection model with Apriori Association rule and particle swarm optimization by Adebayo, Olawale Surajudeen, Abdul Aziz, Normaziah

    Published 2019
    “…These rule models are used together with extraction algorithm to classify and detect malicious android application. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions by Saraswati, Galuh Wilujeng

    Published 2017
    “…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancing teaching and learning through data-driven optimization of servicing code demand and lecturer allocation using WEKA analysis by Rochin Demong, Nur Atiqah, Mohamed Razali, Murni Zarina, Kamaruddin, Juliana Noor, Shamsuddin, Sazwan, Awang, Nor Ain, Kamarudin, Norjuliatie, Wan Othman, Noor Faradilla

    Published 2025
    “…This study applies machine learning techniques using the WEKA analytical tool to explore, cluster and classify servicing code applications using a dataset gathered from multiple faculties, and campuses within the Faculty of Business and Management in a selected public university in Malaysia. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Three-dimensional coded aperture scintigraphy proposed for early tumor detection by Hussain, K., Saripan, M.I., Alnafea, M.A., Mahboub, D., Mahmud, R., Adnan, W.A. Wan, Xianling, D.

    Published 2024
    “…The proposed imaging system uses a MURA mask and antimask dual reconstruction, and the raw projections are reconstructed using an iterative algorithm, Maximum Likelihood Expectation Maximization (MLEM). …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20