Search Results - (( variable _ application algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Saraf, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…In order to fill this gap, this article proposes a novel framework for comparing various variants of variable length-searching meta-heuristic algorithms in the application of feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Saraf, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…In order to fill this gap, this article proposes a novel framework for comparing various variants of variable length-searching meta-heuristic algorithms in the application of feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Sara, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…In order to fill this gap, this article proposes a novel framework for comparing various variants of variable length-searching meta-heuristic algorithms in the application of feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8
  9. 9

    Multi-stage thermal-economical optimization of compact heat exchangers: A new evolutionary-based design approach for real-world problems by Yousefi M., Darus A.N., Yousefi M., Hooshyar D.

    Published 2023
    “…Algorithms; Constraint theory; Design; Entropy; Fins (heat exchange); Genetic algorithms; Heat exchangers; Particle swarm optimization (PSO); Thermodynamics; Compact heat exchanger; Engineering applications; Entropy generation minimization; Evolutionary algorithms (EAs); Inequality constraint; Multi stage; Plate-fin heat exchanger; Variable operating condition; Evolutionary algorithms…”
    Article
  10. 10
  11. 11

    FPGA implementation of variable precision Euclid’s GCD algorithm by Al-Haija, Qasem Abu, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Alfarran, Islam

    Published 2017
    “…It contributes to almost all public key cryptographic algorithms over a finite field of arithmetic. This, in turn, has led to increased research in this domain, particularly with the aim of improving the performance throughput for many GCD-based applications. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…However, most model selection algorithms such as Autometrics only concentrate on single equation modelling which has limited application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20

    Identification of continuous-time hammerstein model using improved archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad, Cho, Bo Wen

    Published 2024
    “…Although various optimization algorithms have been widely employed in multiple applications, the traditional Archimedes optimization algorithm (AOA) has presented imbalanced exploration with exploitation phases and the propensity for local optima entrapment. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article