Search Results - (( java application customization algorithm ) OR ( mere classification system algorithm ))

  • Showing 1 - 7 results of 7
Refine Results
  1. 1

    On the exploration and exploitation in popular swarm-based metaheuristic algorithms by Hussain, Kashif, Mohd Salleh, Mohd Najib, Cheng, Shi, Shi, Yuhui

    Published 2018
    “…This study, therefore, performed in-depth empirical analysis by quantitatively analyzing exploration and exploitation of five swarm-based metaheuristic algorithms. The analysis unearthed explanations the way algorithms performed on numerical problems as well as on real-world application of classification using adaptive neuro-fuzzy inference system (ANFIS) trained by selected metaheuristics. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Discovering decision algorithm from a distance relay event report by Othman, Mohammad Lutfi, Aris, Ishak, Abdullah, Senan Mahmood, Ali, Md. Liakot, Othman, Mohammad Ridzal

    Published 2009
    “…In this study rough-set-based data mining strategy was formulated to discover distance relay decision algorithm from its resident event report. This derived algorithm, aptly known as relay CD-prediction rules, can later be used as a knowledge base in support of a protection system analysis expert system to predict, validate or even diagnose future unknown relay events. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Classification Modeling for Malaysian Blooming Flower Images Using Neural Networks by Muhammad Ashraq, Salahuddin

    Published 2013
    “…The Decision Tree classification results indicate that the highest performance obtained by Chi-Squared Automatic Interaction Detection(CHAID) and Exhaustive CHAID (EX-CHAID) is merely 42% with DOUBLE. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Biometric identification and recognition for iris using failure rejection rate (FRR) / Musab A. M. Ali by M. Ali, Musab A.

    Published 2016
    “…At any process of recognition stage, the biometric data is protected and also whenever there is a compromise to any information in the database it will be on the cancelable biometric template merely without affecting the original biometric information. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item