Search Results - (( java application customization algorithm ) OR ( using generalised application algorithm ))

Refine Results
  1. 1

    A generalised hybrid similarity measure of rough Neutrosophic set with roughness approximation / Hafiza Jamaludin, Nik Nur Auni Rahman Nik Shaidin and Nur Hidayah Abdul Faatah. by Jamaludin, Hafiza, Rahman Nik Shaidin, Nik Nur Auni, Abdul Faatah, Nur Hidayah

    Published 2022
    “…The roughness approximation is used in the definition of the generalised hybrid similarity measure between hamming and cosine similarity measure. …”
    Get full text
    Get full text
    Student Project
  2. 2
  3. 3

    Solving Boundary Value Problems for Ordinary Differential Equations Using Direct Integration and Shooting Techniques by V., Malathi

    Published 1999
    “…A generalised variable order variable stepsize Direct Integration (01) method, a generalised Backward Differentiation method (BDF) and shooting techniques are used to solve the given BVP. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Fault diagnosis in unbalanced radial distribution networks using generalised regression neural network by Mirzaei, Maryam

    Published 2011
    “…Nowadays, about 80% of interruptions are caused by faults in distribution networks and the application of fault location algorithms developed for transmission system is not an easy task due to the topology and operating principles of the distribution networks. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Sampling weight adjustments in partial least squares structural equation modeling: guidelines and illustrations by Cheah, Jun Hwa, Roldan, Jose L., Ciavolino, Enrico, Ting, Hiram, Ramayah, T.

    Published 2020
    “…The results of the WPLS algorithm and the traditional PLS algorithm are then compared using a marketing research model. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Transtheoretical model of change for weight control in Malaysian context by Chang, Ching Thon

    Published 2010
    “…As such, the relationship between Stages and Processes of Change in this study is less distinctive, making the generalisability of this construct less convincing. This research study found the focus groups and survey used in a concurrent mixed method approach was illuminating. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Adaptive artificial neural network for power system security assessment and control action by Al-Masri, Ahmed Naufal A.

    Published 2012
    “…This is particularly important for giving a possible control action to mitigate an insecure situation during disturbance using AANN. This technique is used to improve the performance and to develop a software tool which is integrated with PSS™E software for contingency analysis. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Sure (EM)-Autometrics: An Automated Model Selection Procedure with Expectation Maximization Algorithm Estimation Method (S/O 14925) by Kamarudin, Nur Azulia

    Published 2021
    “…Hence, the integration of EM algorithm estimation is applicable in improving the performance of automated model selection procedures for multiple equations models…”
    Get full text
    Get full text
    Monograph
  12. 12

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14
  15. 15

    Analysis and Decentralised Optimal Flow Control of Heterogeneous Computer Communication Network Models by Ku Mahamud, Ku Ruhana

    Published 1993
    “…A new method of general model reduction using the Norton' s theorem for general queueing networks in conjunction with the universal maximum entropy algorithm is proposed for the analysis of large general closed queueing networks. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17

    New Sequential and Parallel Division Free Methods for Determinant of Matrices by Sharmila, Karim

    Published 2013
    “…The research also aims to generalise the Sarrus Rule for any order of square matrices based on permutations which are derived using starter sets. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Modeling financial environments using geometric fractional Brownian motion model with long memory stochastic volatility by Al Haqyan, Mohammed Kamel Mohammed

    Published 2018
    “…All parameters involved in the developed model are estimated by using innovation algorithm. A simulation study is then conducted to determine the performance of the new model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Integrated examination and analysis model for improving mobile cloud forensic investigation by Alnajjar, Ibrahim Ali Mohammad

    Published 2022
    “…This research proposes an integrated Examination and Analysis (EA) model for a generalised application architecture of CMA deployable on the public cloud to trace the case-specific evidential artifacts. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Analysis and decentralised optimal flow control of heterogeneous computer communication network models by Ku-Mahamud, Ku Ruhana

    Published 1993
    “…A new method of general model reduction using the Norton' s theorem for general queueing networks in conjunction with the universal maximum entropy algorithm is proposed for the analysis of xix large general closed queueing networks. …”
    Get full text
    Get full text
    Get full text
    Thesis