Search Results - (( understand distributed databases algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 10 results of 10
Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Comparative spatial analysis of enteric fever and leptospirosis in Kelantan, Malaysia using e-notifikasi surveillance database, 2016 – 2022 by Hatta, Hazlienor Mohd

    Published 2023
    “…Diagnostic algorithms, targeted interventions and early warning systems can be implemented based on these findings to improve disease control and prevention strategies.…”
    Get full text
    Get full text
    Thesis
  5. 5

    An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis by Ong, Phaik Ling

    Published 2016
    “…Association rule mining (ARM) was introduced in RCA to extract frequently occur patterns, interesting correlations, associations or casual structures among items in the database. However, frequent pattern mining (FPM) using Apriori-like algorithms and support-confidence framework suffers from the myth of rare item problem in nature. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Development of MATLAB® GUI for infant cry signal analysis using FFT / Suzilawati Muhamud @ Kayat by Muhamud @ Kayat, Suzilawati

    Published 2008
    “…The development; of GUI requires a good understanding and skills in programming the M-File code and it was the most challenging part for this study.…”
    Get full text
    Get full text
    Thesis
  8. 8

    Morphology, molecular characterization and habitat preference of harmful Benthic dinoflagellate gambierdiscus (Dinophyceae) in Malaysia / Nurin Izzati Mustapa by Nurin Izzati , Mustapa

    Published 2020
    “…Morphological information and the distribution of Gambierdiscus species were used to develop a comprehensive taxonomic database of Gambierdiscus, and a 3I web-based interactive identification key for species identification is presented. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    A systematic review of recurrent neural network adoption in missing data imputation by Nur Aqilah, Fadzil Akbar, Mohd Izham, Mohd Jaya, Mohd Faizal, Ab Razak, Nurul Aqilah, Zamri

    Published 2025
    “…This study aims to comprehensively evaluate recent RNN methods for missing data imputation, focusing on their strengths and weaknesses to provide a detailed understanding of the current landscape. A systematic literature review was conducted on RNN-based data imputation methods, covering research articles from 2013 to 2023 that were identified in the SCOPUS database. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    A systematic review of recurrent neural network adoption in missing data imputation by Nur Aqilah, Fadzil Akbar, Mohd Izham, Mohd Jaya, Mohd Faizal, Ab Razak, Nurul Aqilah, Zamri

    Published 2025
    “…This study aims to comprehensively evaluate recent RNN methods for missing data imputation, focusing on their strengths and weaknesses to provide a detailed understanding of the current landscape. A systematic literature review was conducted on RNN-based data imputation methods, covering research articles from 2013 to 2023 identified in the SCOPUS database. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article