Search Results - (( developing activation function algorithm ) OR ( java evaluation technique algorithm ))

Refine Results
  1. 1

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…Therefore, FRA using FRT was constructed and the performance of the FRA was evaluated. The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…Third approach is transforming identifiers to junk code to hide the meaning and increase the complexity of the code. Empirical evaluation was conducted to evaluate the proposed Hybrid Obfuscation Technique. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation by Nathan, Darmawan, Ooi, Keng Boon, Chong, Alain Yee Loong, Tan, Boon In

    Published 2010
    “…The objective of this study is to provide software developers some measures to evaluate software quality of a Java program. Studies on software quality requirements, software quality models (as a quantifying measurement technique) and various good design rules are required for. …”
    Get full text
    Get full text
    Article
  5. 5

    Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms by Bakar, Abubakar Diwani

    Published 2016
    “…The software metric thresholds were used as indication for identifying unsafe design in software engineering. To evaluate this technique, an experiment was conducted on two geospatial systems developed using Java programming language where the Chidamber and Kemerer (CK) metrics were used. …”
    Get full text
    Get full text
    Thesis
  6. 6

    An ensemble learning method for spam email detection system based on metaheuristic algorithms by Behjat, Amir Rajabi

    Published 2015
    “…Recently, various techniques based on different algorithms have been developed. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…Several different algorithms have been proposed for computer recognition of human faces. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Effort Estimation Model for Function Point Measurement by Koh, Tieng Wei

    Published 2007
    “…This research work has generated an algorithmic effort estimation model for function points measurement. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Shunt active power filter using hybrid fuzzy-proportional and crisp-integral control algorithms for total harmonic distortion improvement by Abdul Rahman, Nor Farahaida

    Published 2016
    “…Utilization of soft-computing algorithms in the operation of Shunt Active Power Filters (SAPFs) becomes a latest trend. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…The research experiment has shown the process of calculating the Distance matrix for the sample Java Programs and subsequent evaluation using the mutation testing approach and APFD calculation. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Developing A Control Protocol Algorithm For Stimulating The Street Light System by Wong, Kwo Yiang

    Published 2017
    “…Thus, smart protocol algorithm is developed to replace the previous system. …”
    Get full text
    Get full text
    Monograph
  12. 12

    Real time nonlinear filtered-x lms algorithm for active noise control by Sahib, Mouayad Abdulredha

    Published 2012
    “…The NLFXLMS algorithm is a stochastic gradient algorithm that incorporates the derivative of a nonlinear plant model which is represented by the scaled error function (SEF) in the controller design. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Gps solution for active queue management using android platform by Liu, Yu Yao

    Published 2021
    “…Since queueing in different locations is considered as a optimisation problem, several algorithms are reviewed to tackle the problem, such as brute force method, nearest neighbour algorithm, and branch and bound algorithm. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  14. 14
  15. 15

    Jogging activity recognition using k-NN algorithm by Afifah Ismail

    Published 2022
    “…The objective of this project are 1) to investigate human activity recognition (HAR) for jogging activity and k-Nearest Neighbors (k-NN) algorithm for jogging classifier, 2) to apply HAR AND k-NN for jogging recognition and classification and, 3) to test the functionality of the k-NN algorithm of jogging recognition and classification. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  16. 16

    Performance comparison of THF-NLFXLMS and VFXLMS algorithms for Hammerstein NANC by Srazhidinov, Radik, Raja Ahmad, Raja Mohd Kamil

    Published 2016
    “…Recently, THF-NLFXLMS algorithm was developed to compensate the nonlinearity encountered in nonlinear active noise control systems. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    A cluster-based hybrid replica control protocol for high availability in data grid by Mabni, Zulaile

    Published 2019
    “…The performance of CBH protocol is evaluated theoretically and using simulations. A discrete event simulator called GridSim and Java programming language is used to simulate the proposed protocol. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Uninterruptible power supply topology using single phase matrix converter with active power filter functionality / Muhammad Shawwal Mohamad Rawi by Mohamad Rawi, Muhammad Shawwal

    Published 2022
    “…The distorted supply current waveform due to the non-linear load is compensated through a proper switching algorithm of SPMC to function as an Active Power Filter (APF). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Process Planning Optimization In Reconfigurable Manufacturing Systems by Musharavati, Farayi

    Published 2008
    “…Five (5) Alternative Algorithm Design Techniques (AADTs) were developed and investigated for suitability in providing process planning solutions suitable for reconfigurable manufacturing. …”
    Get full text
    Get full text
    Thesis