Search Results - (( variable application a algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Saraf, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…In order to fill this gap, this article proposes a novel framework for comparing various variants of variable length-searching meta-heuristic algorithms in the application of feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Saraf, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…In order to fill this gap, this article proposes a novel framework for comparing various variants of variable length-searching meta-heuristic algorithms in the application of feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Framework of Meta-Heuristic Variable Length Searching for Feature Selection in High-Dimensional Data by Qadir Sara, Tara Othman, Fuad, Norfaiza, Md Taujuddin, Nik Shahidah Afifi

    Published 2023
    “…In order to fill this gap, this article proposes a novel framework for comparing various variants of variable length-searching meta-heuristic algorithms in the application of feature selection. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13

    FPGA implementation of variable precision Euclid’s GCD algorithm by Al-Haija, Qasem Abu, Syed Ahmad Abdul Rahman, Sharifah Mumtazah, Alfarran, Islam

    Published 2017
    “…It contributes to almost all public key cryptographic algorithms over a finite field of arithmetic. This, in turn, has led to increased research in this domain, particularly with the aim of improving the performance throughput for many GCD-based applications. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    SURE-Autometrics algorithm for model selection in multiple equations by Norhayati, Yusof

    Published 2016
    “…However, most model selection algorithms such as Autometrics only concentrate on single equation modelling which has limited application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Identification of continuous-time hammerstein model using improved archimedes optimization algorithm by Islam, Muhammad Shafiqul, Mohd Ashraf, Ahmad, Cho, Bo Wen

    Published 2024
    “…This proposed algorithm also discerned linear and nonlinear subsystem variables within a continuous-time Hammerstein model utilizing input and output data. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Slight-Delay Shaped Variable Bit Rate (SD-SVBR) Technique for Video Transmission by Ahmad Suki, Che Mohamed Arif

    Published 2011
    “…However, this algorithm has to be combined with a network feedback algorithm to produce a better overall video rate control. …”
    Get full text
    Get full text
    Get full text
    Thesis