Search Results - (( development model interception algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 5 results of 5
Refine Results
  1. 1

    Detection of butter adulteration with lard by employing 1H-NMR spectroscopy and multivariate data analysis by Ahmad Fadzlillah, Nurrulhidayah, Che Man, Yaakob, Abdul Rohman, Ismail, Amin, Mustafa, Shuhaimi, Rosman, Arieff Salleh, Khatib, Alfi

    Published 2014
    “…Cross validation testing evaluates the predictive power of the model. PLS model was shown as good models as the intercept of R2Y and Q2Y were 0.0853 and -0.309, respectively.…”
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4

    Consumers' intention to use e-money mobile using the decomposed theory of planned behavior by Husnil, Khatimah

    Published 2016
    “…The Partial Least Squares Method (PLS) series PLS 2.0 M3 for algorithm and bootstrap techniques and SPSS 18 was used to test the hypothesis that has been developed. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item