Search Results - (( programming model extraction algorithm ) OR ( java data function algorithm ))

Refine Results
  1. 1

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Modeling Computational Problem Solving (CPS) is the main issue in teaching programming where the given text is needed to be transformed into a model then later into a programming language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  3. 3
  4. 4

    Twofold Integer Programming Model for Improving Rough Set Classification Accuracy in Data Mining. by Saeed, Walid

    Published 2005
    “…Apart from introducing the TIP model, this research also addressed the issues of missing values, discretization and extracting minimum rules. …”
    Get full text
    Get full text
    Thesis
  5. 5

    An Information Retrieval Algorithm to Extract Influential Factors by Nabilah Filzah, Mohd Radzuan

    Published 2012
    “…This indicates that the algorithm was able to produce a good model. The extraction algorithm developed showed that influencial factors produced could be used as guideline for companies to monitor and strategize ways for business improvement.…”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…Generally, these source codes go through the preprocessing, comparison, extraction, generate program semantics and classification processes. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A review of slicing techniques in software engineering by Shah, Asadullah, Raza, Ali, Hassan, Basri, Shah, Abdul Salam

    Published 2015
    “…A common practice now is to extract the sub models out of the giant models based upon the slicing criteria. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  8. 8

    Image clustering comparison of two color segmentation techniques by Subramaniam, Kavitha Pichaiyan

    Published 2010
    “…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Optimal timber transportation planning in tropical hill forest using bees algorithm by Jamaluddin, Jamhuri

    Published 2022
    “…This study proposed a multi-objective linear programming model with Bees algorithm (BA) to find an optimal cost TTP for extraction, forest road, and landing locations. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Logic Programming In Radial Basis Function Neural Networks by Hamadneh, Nawaf

    Published 2013
    “…In this thesis also, I developed a new technique to extract the logic programming from radial basis function neural networks. …”
    Get full text
    Get full text
    Thesis
  11. 11

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan by Mohd Hanis, Rani, Abdullah, Embong

    Published 2013
    “…The objective was to identify and implement the most accurate algorithm for the KPTM dataset and to come up with a good prediction model using decision tree technique. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin by Nasaruddin, Amir Hambaly

    Published 2019
    “…For the user to analyze the result, the system provides visual analytics technique which can educate the user on analyzing the result which is drill down and sorting function to educate users. The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Controller And Circuitry Design And Implementation For Fire Fighting Robot For MIROC 2014 Competition by Reyfill Konnik, Charlie Ivan

    Published 2014
    “…This algorithm is designed using an iterative design model, whereby the program is continually tested and improved. …”
    Get full text
    Get full text
    Final Year Project
  15. 15

    Finite Element Modeling Of Ballistic Penetration into Fabric Armor by Talebi, Hossein

    Published 2006
    “…This program (named DYNTEX) based on the mentioned algorithm is designed using MATLAB code. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Long-term electrical energy consumption: Formulating and forecasting via optimized gene expression programming / Seyed Hamidreza Aghay Kaboli by Seyed Hamidreza , Aghay Kaboli

    Published 2018
    “…Firstly, a multi-objective feature selection approach is developed in this study to extract the most influential subsets of input variables from each historical data type (EEC and SEI) with maximum relevancy and minimum redundancy for long-term EEC modeling. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java.…”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Mapreduce algorithm for weather dataset by Khalid Adam, Ismail Hammad

    Published 2017
    “…Graphical analysis has been used to represent the result from the MapReduce Algorithm. Results from the proposed algorithm have been compared with the existing model known as AWK (Alfred Aho, Peter Weinberger, and Brian Kernighan) model. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A review on sentiment analysis model Chinese Weibo text by Dawei Wang, Rayner Alfred

    Published 2020
    “…In feature extraction, the Lexicon-based Model, Machine learning Model and deep learning Model usually was used. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceedings
  20. 20

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article