Search Results - (( parameter deviation tree algorithm ) OR ( java applications customization algorithm ))
Search alternatives:
- applications customization »
- customization algorithm »
- parameter deviation »
- java applications »
- deviation tree »
- tree algorithm »
-
1
Parameter estimation and outlier detection in linear functional relationship model / Adilah Abdul Ghapor
Published 2017“…Here, a robust stopping rule for the cluster tree base on the median and median absolute deviation (MAD) of the tree heights is proposed. …”
Get full text
Get full text
Get full text
Thesis -
2
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…Thus, it has been found that Satari’s algorithm (S-SL algorithm) performs well for any values of sample size n and error concentration parameter. …”
Get full text
Get full text
Get full text
Article -
3
Comparative study of clustering-based outliers detection methods in circularcircular regression model
Published 2021“…Thus, it has been found that Satari’s algorithm (S-SL algorithm) performs well for any values of sample size n and error concentration parameter. …”
Get full text
Get full text
Get full text
Article -
4
Comparative study of clustering-based outliers detection methods in circular-circular regression model
Published 2021“…Thus, it has been found that Satari's algorithm (S-SL algorithm) performs well for any values of sample size n and error concentration parameter. …”
Get full text
Get full text
Get full text
Article -
5
Parameter estimation and outlier detection for some types of circular model / Siti Zanariah binti Satari
Published 2015“…Then, a stopping rule for the cluster tree based on the mean direction and circular standard deviation of the tree height is proposed. …”
Get full text
Get full text
Thesis -
6
-
7
Implementation of machine learning algorithms for streamflow prediction of Dokan dam
Published 2023“…This study aims at comparing the application of deep learning algorithms and conventional machine learning algorithms for predicting reservoir inflow. …”
text::Thesis -
8
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
