Search Results - (( software aggregation method algorithm ) OR ( java application during algorithm ))

Refine Results
  1. 1

    Design optimization of valve timing at various engine speeds using Multi-Objective Genetic Algorithm (MOGA) by Mohiuddin, A. K. M., Ashour, Ahmed Aly Ibrahim Shaaban, Yap, Haw Shin

    Published 2008
    “…Multi-objective Genetic Algorithms (MOGA) are an extension of Genetic Algorithms (GA) that does not require multiple objectives to be aggregated to one value. …”
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    A novel rank aggregation-based hybrid multifilter wrapper feature selection method in software defect prediction by Balogun, A.O., Basri, S., Mahamad, S., Capretz, L.F., Imam, A.A., Almomani, M.A., Adeyemo, V.E., Kumar, G.

    Published 2021
    “…The first stage involves a rank aggregation-based multifilter feature selection (RMFFS) method that addresses the filter rank selection problem by aggregating individual rank lists from multiple filter methods, using a novel rank aggregation method to generate a single, robust, and non-disjoint rank list. …”
    Get full text
    Get full text
    Article
  3. 3
  4. 4

    A computational framework for predicting software quality-in-use from software reviews by Atoum, Issa

    Published 2015
    “…In the sentiment analysis area, we proposed an algorithm to classify and aggregate software review-sentences into QinU topics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    SUDOKU HELPER by Abdul Razak, Muhammad Asyraf

    Published 2015
    “…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Even-odd scheduling based energy efficient routing for wireless sensor network (WSN) / Muhammad Zafar Iqbal Khan by Khan, Muhammad Zafar Iqbal

    Published 2022
    “…Using the simulation software, it was observed that the alive nodes are higher in numbers i.e. 189 nodes after 500 rounds for the proposed routing algorithm compared to the previous methods which had only 150 alive nodes. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Spatial Simulation for Flood Disaster Forecasting: A Geospatial Technology-based Group Analytic Hierarchy Process Approach by Dano Lawal, Umar, Matori, Abdul Nasir, Wan Yusof, Khamaruzaman, Mustafa Hashim , Ahmad, Aminu, Mansir, Sabri, Soheil, Balogun, Abdul-Lateef, Ahmed Chandio, Imtiaz, Radin Mohd Mokhtar, Munirah

    Published 2013
    “…In validating the robustness of the result, known Flood Extent Extraction Model developed based on a Neural Network Algorithm embedded in ENVI 4.8 software was used. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Investigation and analysis of crack detection using UAV and CNN: A case study of Hospital Raja Permaisuri Bainun by Goh, Wei Sheng, Wan Din, Wan Isni Sofiah, Waseem, Quadri, Zabidi, A.

    Published 2023
    “…Therefore, we conducted a real-world experiment of crack detection at Hospital Raja Permaisuri Bainun using DJI Mavic Air (Drone Hardware) and DJI GO 4(Drone Software) using CNN through MATLAB software with CNN-SVM method with the accuracy rate of 3.0 percent increased from 82.94% to 85.94%. in comparison with other ML algorithms like CNN Random Forest (RF), Support Vector Machine (SVM) and Artificial Neural Network (ANN).…”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Multi-perspective usability evaluation with multi-criteria decision analysis for optimal selection of open-source software by Dawood, Kareem Abbas

    Published 2021
    “…Most comprehensive and complex software packages are partitioned across multiple portals and involve many users — each with their own role in the software package. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  13. 13
  14. 14

    Novel multi-perspective usability evaluation framework for selection of open source software based on BWM and group VIKOR techniques by Dawood, Kareem A., Zaidan, A. A., Sharif, Khaironi Y., Ghani, Abdul A., Zulzalil, H., Zaidan, B. B.

    Published 2021
    “…Most large and complex software packages partitioned across multiple portals and involve many users — each with their role in the software package; those users have different perspectives on the software package, defined by their knowledge, responsibilities, and commitments. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16
  17. 17

    A malware analysis and detection system for mobile devices / Ali Feizollah by Ali, Feizollah

    Published 2017
    “…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications by Hydara, Isatou

    Published 2015
    “…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
    Get full text
    Get full text
    Thesis
  20. 20

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis