Search Results - (( policy implementation mining algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- policy implementation »
- implementation mining »
- mining algorithm »
- java application »
-
1
Profiling network traffic of Sultan Idris Shah building (BSIS) using data mining technique / Rusmawati Ishak
Published 2018“…This research implement unsupervised data mining approach to analyse the network traffic trend of BSIS. …”
Get full text
Get full text
Thesis -
2
-
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Dynamic investment model for the restructed power market in the presence of wind source
Published 2014“…The proposed framework has been implemented in the hypothetical restructured power market using the IEEE Reliability Test System. …”
Get full text
Get full text
Thesis -
5
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
