Search Results - (( variable extractions towards algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- extractions towards »
- towards algorithm »
- java application »
- variable »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Classification for large number of variables with two imbalanced groups
Published 2020“…This study proposed two algorithms of classification namely Algorithm 1 and Algorithm 2 which combine resampling, variable extraction, and classification procedure. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
3
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
4
-
5
Identification of Electrooculography Signals Frequency Energy Distribution Using Wavelet Algorithm
Published 2011“…The recorded data was composed of an eye movement toward four directions, i.e., downward, upward, leftward and rightward. …”
Get full text
Get full text
Get full text
Article -
6
Characteristics of electronic cigarette and vape users in Malaysia: Lessons from decision tree analysis
Published 2020“…Several predictor variables included in this study were: seven demographics variables (i.e., age, gender, race, residence, marital, occupation and education) and twenty variables on the perception of ECV use. …”
Get full text
Get full text
Get full text
Article -
7
RARE: mining colossal closed itemset in high dimensional data
Published 2018“…Among the vast data mining tasks, association rules have been extensively employed so as to describe the correlations between the variables found in a dataset. The task of mining association rules highly relies on the efficiency of the algorithms to extract all frequent itemsets that exist in the database. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
Performance study of low-speed wind energy harvesting by micro wind turbine system
Published 2025“…By utilizing maximum power point tracking (MPPT) algorithms, this study investigates the operational strategies of wind turbines subjected to variable wind conditions, with a particular focus on optimizing energy capture during low to moderate wind speeds. …”
Get full text
Get full text
Get full text
Article -
11
Classification of compressive strength grades for lightweight aggregate concrete with palm oil fuel ash (POFA) using kNearest Neighbour (k-NN)
Published 2023“…Annually, a massive number of agricultural by-products of the palm oil extraction process including palm oil fuel ash (POFA) were generated which contributes towards ammonia pollution and emission of nitrogen compounds. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
Classification of compressive strength grades for lightweight aggregate concrete with palm oil fuel ash (POFA) using k-Nearest Neighbour (k-NN)
Published 2023“…Annually, a massive number of agricultural by-products of the palm oil extraction process including palm oil fuel ash (POFA) were generated which contributes towards ammonia pollution and emission of nitrogen compounds. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Many programming languages are used for programming; Java programming language is known to be most common due to its features, the use of this popular language increases an attacker's ability to steal intellectual property (IP), as the source program is translated to an intermediate format retaining most of the information such as meaningful variables names present in source code. An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis
