Search Results - (( construct evaluation process algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…Therefore, FRA using FRT was constructed and the performance of the FRA was evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing by Husna, Jamal Abdul Nasir

    Published 2011
    “…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…These methods are proposed to improve the descriptive accuracy of the summarized data. In the process of summarizing relational data, a genetic algorithm is also applied and several feature scoring measures are evaluated in order to find the best set of relevant constructed features. …”
    Get full text
    Get full text
    Research Report
  8. 8

    A tool for addressing construct identity in literature reviews and meta-analyses by Larsen, Kai Rune T., Bong, Chih How

    Published 2016
    “…Through the adaptation and combination of different natural language processing (NLP) algorithms, six designs were created and evaluated against human expert decisions. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition by Yahya, Anwar Ali, Mahmod, Ramlan, Ramli, Abd Rahman

    Published 2010
    “…To evaluate the proposed approaches of design, three stages of experiments have been conducted. …”
    Get full text
    Get full text
    Article
  11. 11

    Non-fiducial based electrocardiogram biometrics with kernel methods by Hejazi, Maryamsadat

    Published 2017
    “…A new non-fiducial approach is proposed for feature extraction. This approach constructs an algorithm by combining autocorrelation (AC) and Kernel Principal Component Analysis (KPCA) techniques. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Optimization of Prediction Error in CO2 Laser Cutting process by Taguchi Artificial Neural Network Hybrid with Genetic algorithm by Nukman, Y., Hassan, M.A., Harizam, M.Z.

    Published 2013
    “…The simulation results were evaluated and verified with the experiment. In some cases, the prediction errors of Taguchi ANN model was larger than 10 even with Levenberg Marquardt training algorithm. …”
    Get full text
    Article
  13. 13

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Hybrid BLEU Algorithm For Structured Exam Management System by Zulhana, Zulkifle

    Published 2008
    “…Teaching and learning process is very essential in education. To evaluate teaching and learning process, many techniques can be applied for instance quiz, test, practical and so forth. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…Text categorization is the process of grouping documents or words into predefined categories. …”
    Get full text
    Get full text
    Final Year Project
  16. 16

    Support Vector Machines (SVM) in Test Extraction by Ghazali, Nadirah

    Published 2006
    “…Text categorization is the process of grouping documents or words into predefined categories. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Chebyshev approximation of discrete polynomials and splines by Che Seman, Fauziahanim

    Published 2004
    “…These algorithms use either cubic splines or Lagrange polynomials to construct the approximation function. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Assessment of CDA and Morphlink-C Algorithms method in crack detection using [Multirotor DJ1 phantom 3] image / Muhammad Hafizi Abd Rahaim by Abd Rahaim, Muhammad Hafizi

    Published 2018
    “…These data model then was evaluated their availability of processed image to detect crack using CDA and MorphLink-C algorithms. …”
    Get full text
    Get full text
    Thesis
  20. 20