Search Results - (( concern validation using algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- concern validation »
- validation using »
- java application »
- using algorithm »
-
1
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…A sum total of 1600 different file types were used during training then evaluation of the proposed algorithm, where 87% of the injected objects were correctly detected.…”
Get full text
Get full text
Get full text
Get full text
Article -
2
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
3
Development of a multi-objective optimization model for transport and environment in a closed-loop automotive supply chain
Published 2014“…The Multiobjective GSA (MOGSA) algorithm is adopted and then programmed using MATLAB software particularly to the MOACLSC. …”
Get full text
Get full text
Thesis -
4
Modeling of cardiovascular diseases (CVDs) and development of predictive heart risk score
Published 2021“…However, the conversion of a complex form of ML algorithms into a simple statistical model is the prime concern. …”
Get full text
Get full text
Thesis -
5
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks / Salmah Fattah
Published 2022“…Finally, the proposed algorithm’s effectiveness regarding node coverage, energy consumption, Pareto-optimal value, and algorithm execution time is validated using three Pareto-optimal metrics: including inverted generation distance (IGD), hypervolume, and diversity. …”
Get full text
Get full text
Get full text
Thesis -
6
A hybrid multi-objective optimisation for energy efficiency and better coverage in underwater wireless sensor networks
Published 2022“…Finally, the proposed algorithm's effectiveness regarding node coverage, energy consumption, Pareto-optimal value, and algorithm execution time is validated using three Pareto-optimal metrics: including inverted generation distance (IGD), hypervolume, and diversity. …”
Get full text
Get full text
Get full text
Thesis -
7
A pilot study on the validation of vis-screen mobile application for vision test
Published 2020“…We are developing this application based on the need for early detection to avoid further vision loss. The simple algorithm and user-friendly features will promote any layperson to use it with minimal training. …”
Get full text
Get full text
Article -
8
Characterization of PV panel and global optimization of its model parameters using genetic algorithm
Published 2013“…The results of the simulation are compared with the Data Sheet information, which is obtained via experimentation in order to validate the reliability of the approach. Three types of PV modules, using different technologies, are tested for the purpose of this validation, and the results confirm the accuracy and reliability of the approach developed in this study. …”
Get full text
Get full text
Article -
9
Sampling weight adjustments in partial least squares structural equation modeling: guidelines and illustrations
Published 2020“…Addressing this concern, the present paper offers guidelines for using the weighted PLS-SEM (WPLS-SEM) algorithm to apply sampling weights in the model estimation. …”
Get full text
Get full text
Article -
10
Characterization of PV panel and global optimization of its model parameters using genetic algorithm
Published 2023“…The results of the simulation are compared with the Data Sheet information, which is obtained via experimentation in order to validate the reliability of the approach. Three types of PV modules, using different technologies, are tested for the purpose of this validation, and the results confirm the accuracy and reliability of the approach developed in this study. …”
Article -
11
A Comparative Study Of Blockchain Algorithms For Non-Fungible Token
Published 2023“…However, there are some concerns for the community to consider before using NFTs technology universalness. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Predicting bankruptcy using ant colony optimization / Nur Syafiqah Abdul Ghani
Published 2021“…In model development, Ant-Miner was used which consists of three steps. In model validation, to quantify accuracy by approving the informational collection, Ant Colony Optimization Algorithm was used and it was compared with the J48 algorithm. …”
Get full text
Get full text
Student Project -
13
Evaluating the Performance of a Visual Support System for Driving Assistance using a Deep Learning Algorithm
Published 2024“…The model utilises the YOLO V8 deep learning algorithm in the Google Colab environment and is trained using a custom dataset managed by the Roboflow dataset manager. …”
Get full text
Get full text
Get full text
Article -
14
-
15
Revitalizing old drugs: uncovering potential dengue antivirals through in silico target prediction and in vitro validation / Zafirah Liyana Abdullah
Published 2024“…For the L-B approach, a Random Forest (RF) one-vs-one classification model was utilized while the PCM model employed the Parzen-Rosenblatt Windows (PRW) algorithm. Subsequently, the validated predictive models were used to screen marketed drugs, and in vitro assays were conducted to validate the drug’s viral inhibitory potential. …”
Get full text
Get full text
Thesis -
16
Task scheduling in cloud computing using Harris-Hawk Optimization
Published 2024Get full text
Get full text
Get full text
Proceedings -
17
Development Of Water Quality Index Prediction Model For Penang Rivers Using Artificial Neural Network
Published 2021“…Altogether, for BOD, the BR algorithm with 60% training and 12 hidden nodes gives R=0.7825 whereas for COD, the BR algorithm with 70% training and 10 hidden nodes gives R=0.6716. …”
Get full text
Get full text
Monograph -
18
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…Protecting patients' confidential information is a critical concern in medical image steganography. The Least Significant Bits (LSB) technique has been widely used for secure communication. …”
Get full text
Get full text
Get full text
Thesis -
19
Bot detection using machine learning algorithms on social media platforms
Published 2021“…Using bots in social media is a significant concern for information validity and authenticity. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Locust- inspired meta-heuristic algorithm for optimising cloud computing performance
Published 2023“…To validate the effectiveness of the pro posed algorithm, it was tested via simulation using real datasets. …”
Get full text
Get full text
Thesis
