Search Results - (( using active issues algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Nonlinear adaptive algorithm for active noise control with loudspeaker nonlinearity by Dehkordi, Sepehr Ghasemi

    Published 2014
    “…An active method which has received much attention is the use of Active Noise Control (ANC) system which involves an electro acoustic system that cancels unwanted noise using the principle of superposition. …”
    Get full text
    Get full text
    Thesis
  3. 3

    PREDICTIVE ANALYTICS FOR EQUIPMENT FAILURE BY USING GATED RECURRENT UNIT – GENETIC ALGORITHM (GRU – GA) by ZAINUDDIN, ZAHIRAH

    Published 2023
    “…Hence, the issue can be solved by adopting a prediction activity to monitor and predict the state of equipment in advance. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Feature extraction using active appearance model algorithm with Bayesian classification approach by Nuruzzaman, Mohammad, Hussain, Azham, Mohamad Tahir, Hatim, Abu Seman, Mohamad Amir

    Published 2013
    “…This paper addressed some of these issues to bring face recognition more closely to being useful for real-life applications. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    Nonlinear THF-FXLMS algorithm for active noise control with loudspeaker nonlinearity by Ghasemi, Sepehr, Raja Ahmad, Raja Mohd Kamil, Marhaban, Mohammad Hamiruce

    Published 2016
    “…Adaptive algorithms are prevalently applied in the design of nonlinear active noise control (ANC) systems. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Channel Assignment Algorithms in Cognitive Radio Networks: Taxonomy, Open Issues, and Challenges by Ahmed, Ejaz, Gani, Abdullah, Abolfazli, Saeid, Yao, Liu Jie, Khan, Samee U.

    Published 2016
    “…A challenging aspect of such algorithms is the incorporation of the channels' diverse characteristics, highly dynamic network conditions with respect to primary users' activity, and different fragmented sizes of the available channels. …”
    Get full text
    Get full text
    Article
  8. 8

    Pre-emptive resource-constrained multimode project scheduling using genetic algorithm: a dynamic forward approach by Delgoshaei, Aidin, Mohd Ariffin, Mohd Khairol Anuar, Baharudin, B. T. Hang Tuah

    Published 2016
    “…Purpose: The issue resource over-allocating is a big concern for project engineers in the process of scheduling project activities. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    An improved bees algorithm local search mechanism for numerical dataset by Al-Dawoodi, Aras Ghazi Mohammed

    Published 2015
    “…Bees Algorithm (BA), a heuristic optimization procedure, represents one of the fundamental search techniques is based on the food foraging activities of bees. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    A near-optimal centroids initialization in K-means algorithm using bees algorithm by Mahmuddin, Massudi, Yusof, Yuhanis

    Published 2009
    “…This creates problem for novice users especially to those who have no or little knowledge on the data.Trial-error attempt might be one of the possible preference to deal with this issue.In this paper, an optimization algorithm inspired from the bees foraging activities is used to locate near-optimal centroid of a given data set.Result shows that propose approached prove it robustness and competence in finding a near optimal centroid on both synthetic and real data sets.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Internet of Things (IoT) based activity recognition strategies in smart homes: a review by Babangida, Lawal, Perumal, Thinagaran, Mustapha, Norwati, Yaakob, Razali

    Published 2022
    “…This technique is challenged by the nature of IoT technology and perceived data, as well as by human differences, which necessitated additional processing tasks to select significant features for the learning algorithms. In this work, we focus our review on activity recognition implementation strategies by examining various sensors and sensing technologies used to collect useful data from IoT devices, reviewing preprocessing and feature extraction techniques, as well as classification algorithms used to recognize human activities in smart homes. …”
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    Balancing exploration and exploitation in ACS algorithms for data clustering by Jabbar, Ayad Mohammed, Sagban, Rafid, Ku-Mahamud, Ku Ruhana

    Published 2019
    “…The performance of the proposed algorithm is compared with that of several common clustering algorithms using real-world datasets. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A Continuous Overlay Path Probing Algorithm For Overlay Networks by Feily, Maryam

    Published 2013
    “…The primary idea is to perform active measurements using the applications’ packets instead of using extra probe packets. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Utilizing Classifier Algorithms to Analyze Lending Activity at The Sumsel Babel Bank's Pagar Alam Branch by Muhammad, Ichsan, Tri Basuki, Kurniawan

    Published 2023
    “…In this research, a classifier algorithm was applied to create a prediction model to predict the customer before the lending application was used and process to pass the lending process in Bank Sumsel, branch Pagar Alam. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Shuffling algorithms for automatic generator question paper system. by Mohd Jamail, Nor Shahida, Md Sultan, Abu Bakar

    Published 2010
    “…The results indicate shuffling algorithm could be used to overcome randomization issue for GQS.…”
    Get full text
    Get full text
    Article
  17. 17

    On Clustering Algorithm Of Coverage Area Problems In Wireless Sensor Networks by Ismail Abdullah, Kalid Abdlkader Marsal

    Published 2024
    “…In the following paper, the effect that changing the fitness cap used in the genetic algorithm has, on a WSN, in terms of lifespan and the quality of lifespan, is documented. …”
    Article
  18. 18

    Feature extraction for face recognition via Active Shape Model (ASM) and Active Appearance Model (AAM) by Iqtait, M., Mohamad, F.S., Mamat, M.

    Published 2018
    “…Precise and strong location of trait point is a complicated and difficult issue in face recognition. Cootes proposed a Multi Resolution Active Shape Models (ASM) algorithm, which could extract specified shape accurately and efficiently. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Study Of Modified Training Algorithm For Optimized Convergence Speed Of Neural Network by Kang, Miew How

    Published 2016
    “…Artificial neural network (ANN) are widely used as an engineering approach to mimic the human brain activities. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Cluster optimization in VANET using MFO algorithm and K-Means clustering by Ramlee, Sham Rizal, Hasan, Sazlinah, K. Subramaniam, Shamala

    Published 2023
    “…Improving clustering efficiency by sending frequent updates to the CH in term of improving scalability, coverage, and clustering result, while reducing communication and energy consumption. Overall, the MFO Algorithm and K-Means algorithm can be used in combination to optimize the clustering in VANET, leading to better network performance, more reliable communication, and improved efficiency.…”
    Get full text
    Get full text
    Conference or Workshop Item