Search Results - (( java application customization algorithm ) OR ( data internalization based algorithm ))

Refine Results
  1. 1
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7

    Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.] by Pusadan, Mohammad Yazdi, Rabbani, Mohammad Abied, Ardiansyah, Rizka, Ngemba, Hajra Rasmita

    Published 2023
    “…The purpose of this study is to apply the K-Means algorithm to perform clustering on COVID-19 data to determine the high spread of the virus in regions in Indonesia based on the frequency of the data. …”
    Get full text
    Get full text
    Book Section
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Algorithm development for optimization of a refrigeration system by Izzat, Mohamad Adnan

    Published 2010
    “…Finally, obtained the enthalpies for each of the points of interest by using conventional method using P-h diagram based on combination of temperature and pressure data taken from experiment from the value of enthalpies ateach point of interest, performance analysis was conducted to obtain the compressor work, heat picked up, and the COP From the result we use Statistica software to generate an algorithm and by the algorithm find the optimum charge for refrigerator system based on international COPR . …”
    Get full text
    Get full text
    Undergraduates Project Papers
  19. 19
  20. 20