Search Results - (( knowledge application during algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- knowledge application »
- application during »
- during algorithm »
- java application »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Simultaneously, Cultural Algorithms (CA) will be exploited to optimize the performance of proxy caching in accumulating the knowledge between each generation. …”
Get full text
Get full text
Article -
3
Improved autonomous charging of mobile multi-robots using honeybee-inspired algorithm
Published 2016“…The dynamic threshold of remaining energy was activated when the mobile robot has knowledge of charging station. The improved honeybee inspired algorithm showed that the mobile robot could increase working time efficiency from 37% to 95%. …”
Get full text
Get full text
Thesis -
4
SURE-Autometrics algorithm for model selection in multiple equations
Published 2016“…This automatic model selection algorithm is better than non-algorithm procedure which requires knowledge and extra time. …”
Get full text
Get full text
Get full text
Thesis -
5
Agro-ento bioinformation: towards the edge of reality
Published 2002“…The protocols range from the molecular levels to domains of larger dimensions such as those encompassing fraternities of politics and policies, and societal applications. These protocols, algorithms, and visualisations undergo dynamic incubation processes to produce the end product, which is bioinformation. …”
Get full text
Get full text
Inaugural Lecture -
6
A web usage mining approach based on LCS algorithm in online predicting recommendation systems
Published 2008“…This huge amount of data can be a useful source of knowledge. Advanced mining processes are needed for this knowledge to be extracted, understood and used. …”
Get full text
Get full text
Article -
7
Fuzzy genetic algorithms for combinatorial optimisation problems
Published 2012Get full text
Get full text
Thesis -
8
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Rule-based filtering algorithm for textual document
Published 2017Get full text
Get full text
Get full text
Article -
10
-
11
A novel solution to traveling salesman problem using fuzzy sets, gravitational search algorithm, and genetic algorithm
Published 2010“…There are several real-life applications of the TSP in several areas of knowledge including mathematics, computer science, operations research, genetics, engineering, and electronics. …”
Get full text
Get full text
Thesis -
12
Evaluation of MLP-ANN Training Algorithms for Modeling Soil Pore-Water Pressure Responses to Rainfall
Published 2013Get full text
Get full text
Citation Index Journal -
13
An augmented reality real-time cloud-based remote monitoring algorithm for a manufacturing system / Siti Aisyah Jaafar
Published 2021“…Conventional AR-IoT applications only specialize in the localized area for the on-site application and not applicable for a remote monitoring system. …”
Get full text
Get full text
Thesis -
14
Early detection of dengue disease using extreme learning machine
Published 2018Get full text
Get full text
Article -
15
-
16
-
17
BSRCA: Biological sequence analysis approach to robotic soccer with cellular automata classifier
Published 2008Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Holy Qur'an speech recognition system Imaalah checking rule for warsh recitation
Published 2017Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
-
20
