Search Results - (( programming validity test algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2

    Artificial neural network (ANN) modeling & validation to predict compression index of tropical soft soil by Yong, Shirley Xiao Wei

    Published 2010
    “…Therefore, many settlement prediction methods have focused on correlations with in-situ tests, such as the Cone Penetration Test (CPT), Standard Penetration Test (SPT), Dilatometer Modulus Test (DMT), plate load test, and pressure-meter test. …”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  3. 3
  4. 4

    Solving Sudoku puzzles in Binary Integer Linear Programming using Branch and Bound algorithm / Ahida Waliyyah Ahmad Fuad by Ahmad Fuad, Ahida Waliyyah

    Published 2024
    “…This study explores the application of a Binary Integer Linear Programming (BILP) model combined with the Branch and Bound (B&B) algorithm to solve Sudoku puzzles. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Model structure selection for a discrete-time non-linear system using a genetic algorithm by Ahmad, R., Jamaluddin, H., Hussain, M. A.

    Published 2004
    “…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. …”
    Get full text
    Get full text
    Article
  6. 6

    Model structure selection for a discrete-time non-linear system using a genetic algorithm by Ahmad, R., Jamaluddin, H., Hussain, M. A.

    Published 2004
    “…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. …”
    Get full text
    Get full text
    Article
  7. 7

    Model structure selection for a discrete-time non-linear system using genetic algorithm by Ahmad, Robiah, Jamaluddin , Hishamuddin, Hussain, Mohd. Azlan

    Published 2004
    “…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…For statistical analysis, a Wilcoxon non-parametric test is used to test and validate the results of the experiments. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    A Hybrid Multi-objective Integrated JAYA-Evolutionary Programming (MOIJEP) Algorithm for Under Voltage Load Shedding (UVLS) Scheme in Bulk Power System by Shukor S.F.A., Musirin I., Hamid Z.A., Senthil Kumar A.V., Mansor M.H., Salimin R.H.

    Published 2025
    “…MOIJEP integrates the features in the original Jaya algorithm into the conventional Evolutionary Programming (EP). …”
    Conference paper
  12. 12

    Euclidean space data projection classifier with cartesian genetic programming (CGP) by WK Wong, Gopal Lenin, Tan, Terence, Ali Chekima

    Published 2018
    “…This research work is a preliminary work which proposes an evolutionary-based classifier using a simplified Cartesian Genetic Programming (CGP) evolutionary algorithm. Instead on using evolutionary generated rule sets, the CGP generates i) a reference coordinate ii) projection functions to project data into a new 3 Dimensional Euclidean space. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Model structure selection for a discrete-time non-linear system using a genetic algorithm by Ahmad, R., Jamaluddin, H., Hussain, Mohd Azlan

    Published 2004
    “…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. …”
    Get full text
    Get full text
    Article
  14. 14

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Predicting Student Performance in Object Oriented Programming Using Decision Tree : A Case at Kolej Poly-Tech Mara, Kuantan by Mohd Hanis, Rani, Abdullah, Embong

    Published 2013
    “…Using 10-fold cross validation for each algorithm, it was found that decision tree was the best algorithm with 83.6944% correctness. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Novice programmers’ emotion and competency assessments using machine learning on physiological data / Fatima Jannat by Fatima, Jannat

    Published 2022
    “…Hyper-parameter tuning has been used in all the algorithms using k-fold cross validation to have the best accuracy and to avoid the over-fitting issue. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Optimal power flow based on fuzzy linear programming and modified Jaya algorithms by Alzihaymee, Warid Sayel Warid

    Published 2017
    “…A new formulation for the multi-objective optimal power flow (MOOPF) problem that considers DG is introduced. The proposed algorithms have been examined and validated using the IEEE 30-bus and IEEE 118-bus test systems. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Indoor Navigation Algorithm For Mobile Robot by Y.M. Alkasim, Osman Mudthir Elfadil, Abass, Esra Bashir

    Published 2016
    “…Set of experiments presented to validate our system using MATLAB program. Testing verified that good accuracy, sufficient for navigation, was achieved. …”
    Get full text
    Get full text
    Book Section
  19. 19

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Case Slicing Technique for Feature Selection by A. Shiba, Omar A.

    Published 2004
    “…The classification accuracy obtained from the CST method is compared to other selected classification methods such as Value Difference Metric (VDM), Pre-Category Feature Importance (PCF), Cross-Category Feature Importance (CCF), Instance-Based Algorithm (IB4), Decision Tree Algorithms such as Induction of Decision Tree Algorithm (ID3) and Base Learning Algorithm (C4.5), Rough Set methods such as Standard Integer Programming (SIP) and Decision Related Integer Programming (DRIP) and Neural Network methods such as the Multilayer method.…”
    Get full text
    Get full text
    Thesis