Search Results - (( java implementation phase algorithm ) OR ( programming variable extractions algorithm ))
Search alternatives:
- extractions algorithm »
- implementation phase »
- programming variable »
- java implementation »
- phase algorithm »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Augmentation of basic-line-search and quick-simplex-method algorithms to enhance linear programming computational performance
Published 2021“…Linear programming (LP) is a mathematical modelling that formulate a problem into three components which are decision variables, objective function and constraints. …”
Get full text
Get full text
Get full text
Thesis -
3
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Although from human logical thinking, the route can be generated easily but the calculation of checking the route whether it is optimal route or not is difficult and will take long time to be implemented. This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
4
Optimal timber transportation planning in tropical hill forest using bees algorithm
Published 2022“…This study proposed a multi-objective linear programming model with Bees algorithm (BA) to find an optimal cost TTP for extraction, forest road, and landing locations. …”
Get full text
Get full text
Thesis -
5
Classification of students' performance in computer programming course according to learning style
Published 2024Conference Paper -
6
Classification of Students' Performance in Computer Programming Course According to Learning Style
Published 2024“…The critical point of this study is the use of classification algorithm to extract patterns which are examined from the cognitive factor specific learning style. …”
Proceedings Paper -
7
Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli
Published 2018“…In the developed feature selection approach, multi-objective binary-valued backtracking search algorithm (MOBBSA) is used as an efficient evolutionary search algorithm to search within different combinations of input variables and selects the non-dominated feature subsets, which minimize simultaneously both the estimation error and the number of features. …”
Get full text
Get full text
Get full text
Thesis -
8
A review of slicing techniques in software engineering
Published 2015“…This point is generally identified at a location in a given program coupled with the subset of variables of program. …”
Get full text
Get full text
Get full text
Proceeding Paper -
9
-
10
Development Of Semi-Automatic Liver Segmentation Method For Three-Dimensional Computed Tomography Dataset
Published 2017“…The liver segmentation program with proposed algorithm is evaluated with CT datasets obtained from SLIVER07 to prove its effectiveness in liver segmentation. …”
Get full text
Get full text
Monograph -
11
Fault detection and diagnosis using rule-based support system on fatty acid fractionation column
Published 2003“…Process history based methods (rule-based feature extraction) is used to implement the FDD rule-based support system. …”
Get full text
Get full text
Article -
12
Adaptive constitutive analytical model code for rubber bearings with load-dependent variable analytical model in seismically isolated steel structures
Published 2026“…The integration of these experimental results with the adaptive programming framework facilitated the development of a Variable Analytical Model (VAM) for the rubber bearings, which was compared against a conventional Constant Analytical Model (CAM) representing traditional modeling practices. …”
Get full text
Get full text
Get full text
Article -
13
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis
