Search Results - (( knowledge using two algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…The SURE-Autometrics is also validated using two sets of real data by comparing the forecast error measures with five model selection algorithms and three non-algorithm procedures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    The implementation of z-numbers in fuzzy clustering algorithm for wellness of chronic kidney disease patients by N. J., Mohd Jamal, Ku Muhammad Naim, Ku Khalif, Mohd Sham, Mohamad

    Published 2019
    “…Thus, there are two objectives of this paper; (i) to propose a reliable fuzzy clustering algorithm using z-numbers and; (ii) to cluster the Chronic Kidney Disease (CKD) patients based on the selected indicators to identify which cluster the patients belongs to (Cluster 0, Cluster 1, Cluster 2, Cluster 3 or Cluster 4) based on the membership functions defined. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Enhanced Model Compression for Lipreading Recognition based on Knowledge Distillation Algorithm by Qianru, Lu, Kuryati, Kipli, Tengku Mohd Afendi, Zulcaffle, Yuan, Liu, Xiangju, Liu, Bo, Wang

    Published 2025
    “…The lipreading recognition model LipPC-Net proposed in this paper is built with a large Chinese lipreading data set based on Chinese phonetic rules and grammatical features and consists of two main parts: the P2P sub-model and the P2C sub-model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Sentiment mining using immune network algorithm /Raja Muhammad Hafiz Raja Kamarudin by Raja Kamarudin, Raja Muhammad Hafiz

    Published 2012
    “…With the abundant of knowledge accessible via Internet and the likes, many have ventured into using that knowledge in order to understand deeply on how the available knowledge affected the whole world directly or indirectly. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9
  10. 10

    A Knowledge Management System for Assessing Lecturer Competence in Indonesian Higher Educational Institutions by Syaripudin, Undang

    Published 2025
    “…Lecturer competency measurement is carried out by first checking employee status using the SVM algorithm with an accuracy value of 72.28%, then using a hybrid SVM and PSO algorithm with an accuracy value of 100%. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Fuzzy modeling of brain tissues in Bayesian segmentation of brain MR images by Farzan, Ali, Ramli, Abdul Rahman, Mashohor, Syamsiah, Mahmud, Rozi

    Published 2010
    “…Two different brain MRI datasets are used to evaluate the algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16

    Combining data mining algorithm and object-based image analysis for detailed urban mapping of hyperspectral images by Hamedianfar, Alireza, Mohd Shafri, Helmi Zulhaidi, Mansor, Shattri, Ahmad, Noordin

    Published 2014
    “…The high accuracy of object-based classification can be linked to the knowledge discovery produced by the DM algorithm. This algorithm increased the productivity of OBIA, expedited the process of attribute selection, and resulted in an easy-to-use representation of a knowledge model from a decision tree structure.…”
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Comparison between Market Basket Analysis and Partition Around Medoids clustering for knowledge discovering in consumer consumption pattern / Mohammad Adha Ruslan, Nurul Shahira Mo... by Ruslan, Mohammad Adha, Mohammad Ramly, Nurul Shahira, Saberi, Nor Hasliza

    Published 2019
    “…The main purpose of this study are to compare the knowledge discovery between Market Basket Analysis and Partition Around Medoids and followed by to generate a customer buying pattern by using Market Basket Analysis (MBA) Algorithm and Partition Around Medoids (PAM) Clustering Algorithm. …”
    Get full text
    Get full text
    Student Project
  20. 20

    Developing an intelligent system to acquire meeting knowledge in problem-based learning environments by Chiang, A., Baba, M.S.

    Published 2006
    “…Similarly, the algorithm proposed in MALESAbrain can, be used to deal, the problem of conducting a meeting among learners to solve problems. …”
    Get full text
    Get full text
    Get full text
    Article