Search Results - (( variable reflective learning algorithm ) OR ( java application customization algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1
  2. 2

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Determining malaria risk factors in Abuja, Nigeria using various statistical approaches by Segun, Oguntade Emmanuel

    Published 2018
    “…Based on cross-validation analysis, the score-based algorithm outperformed the constraint-based algorithms in the structural learning. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Computational Thinking : Experiences of Rural Pupils in Sarawak Primary School by Nur Hasheena, Anuar

    Published 2021
    “…Although the quantitative data does not show promising results, the qualitative data can be used to support the learning experiences and knowledge acquired from the learning activities proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Risk perception modeling based on physiological and emotional responses / Ding Huizhe by Ding , Huizhe

    Published 2024
    “…It was demonstrated that the primary results derived from statistical analysis and machine learning modelling were remarkably consistent, thereby confirming the effectiveness and generalization of the proposed weight adjustment algorithm, particularly in situations with closely matched risk levels. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Anomaly detection of denial-of-service network traffic attacks using autoencoders and isolation forest by Ghulam Hussain, Muhammad Thaqif, Shafeeq Lone, Aman, Maspo, Nur-Adib, Attarbashi, Zainab

    Published 2026
    “…and an accuracy of 6.09%, reflecting the difficulty of modelling complex and highly variable network traffic patterns. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Evaluation of multiple In Situ and remote sensing system for early detection of Ganoderma boninense infected oil palm by Ahmadi, Seyedeh Parisa

    Published 2018
    “…Various artificial neural network (ANN) architectures were applied to the datasets to verify the proficiency of various combinations of input variables, learning optimization methods and different numbers of neurons on the hidden layer by MATLAB 2014a software. …”
    Get full text
    Get full text
    Get full text
    Thesis