Search Results - (( rendering classification techniques algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Segmentation Assisted Object Distinction For Direct Volume Rendering by Irani, Arash Azim Zadeh

    Published 2013
    “…Ray casting is a direct volume rendering technique for visualizing 3D arrays of sampled data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…Decision Tree and Random Forest display superior performance compared to other algorithms with 100.00% accuracy. Furthermore, it is observed that feature selection and dimensionality reduction techniques can notably enhance classifier effectiveness while mitigating computational complexity. …”
    Get full text
    Get full text
    Get full text
    Article
  3. 3

    Detecting Malware with Classification Machine Learning Techniques by Mohd Yusof, Mohd Azahari, Abdullah, Zubaile, Hamid Ali, Firkhan Ali, Mohamad Sukri, Khairul Amin, Shaker Hussain, Hanizan

    Published 2023
    “…Decision Tree and Random Forest display superior performance compared to other algorithms with 100.00% accuracy. Furthermore, it is observed that feature selection and dimensionality reduction techniques can notably enhance classifier effectiveness while mitigating computational complexity. …”
    Get full text
    Get full text
    Article
  4. 4

    POWER QUALITY CLASSIFICATION WITH DE-NOISING SCHEME USING WAVELET TRANSFORM AND RULE- BASED METHOD by HENG KEOW, CHUAH

    Published 2012
    “…In this model, Wavelet Multi-Resolution Analysis (MRA) technique was used to decompose the signal into its various details. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    A stacked ensemble deep learning model for water quality prediction / Wong Wen Yee by Wong , Wen Yee

    Published 2023
    “…The proposed deep learning model renders faster without the use of SMOTE. Any resampling algorithm is not a necessity in the case of this proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item