Search Results - (( development model interception algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- interception algorithm »
- development model »
- java application »
-
1
Detection of butter adulteration with lard by employing 1H-NMR spectroscopy and multivariate data analysis
Published 2014“…Cross validation testing evaluates the predictive power of the model. PLS model was shown as good models as the intercept of R2Y and Q2Y were 0.0853 and -0.309, respectively.…”
Get full text
Get full text
Conference or Workshop Item -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
FT-IR- based metabolomics approach to characterize the α-glucosidase inhibitory activity of Salak fruit
Published 2017“…A successful the model was validated by comparing the model intercept values with original values.…”
Get full text
Get full text
Get full text
Proceeding Paper -
4
Consumers' intention to use e-money mobile using the decomposed theory of planned behavior
Published 2016“…The Partial Least Squares Method (PLS) series PLS 2.0 M3 for algorithm and bootstrap techniques and SPSS 18 was used to test the hypothesis that has been developed. …”
Get full text
Get full text
Get full text
Thesis -
5
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
