Search Results - (( features expansion function algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 6 results of 6
Refine Results
  1. 1

    Modern fuzzy min max neural networks for pattern classification by Al Sayaydeh, Osama Nayel Ahmad

    Published 2019
    “…The MDFMM introduces a number of contributions in addition to modify the original FMM expansion activation function by replace it with that from the Enhanced Fuzzy Min Max (EFMM) to eliminate the overlapping cases. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    An Education-Based System for Two-Way Translations of Sign Language by Muhammad Faiz Aiman, Che Umar, Hock Tze, Wong@ Farrah Wong, Sariah, Abang, Jamal, Ahmad Dargham, Seng Kheau, Chung, Mazlina, Mamat

    Published 2025
    “…To enhance the system's functionality, future work could focus on continuous signing, dataset expansion, and adaptive learning. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things by Rahman, Md. Arafatur, Zaman, Nafees, Asyhari, A. Taufiq, Sadat, M. S. Nazmus, Pillai, Prashant, Ruzaini, Abdullah Arshah

    Published 2021
    “…The scheme creates class labels based on the featured keywords from the decision user and classifies suspicious contacts through the aid of ML. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    SPY-BOT: Machine learning-enabled post filtering for social network-integrated industrial internet of things by Rahman, Md. Arafatur, Zaman, Nafees, Asyhari, A. Taufiq, Nazmus Sadat, S. M., Pillai, Prashant, Ruzaini, Abdullah Arshah

    Published 2021
    “…The scheme creates class labels based on the featured keywords from the decision user and classifies suspicious contacts through the aid of ML. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article