Search Results - (( construct evaluation tool algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- construct evaluation »
- data normalization »
- evaluation tool »
- tool algorithm »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
A tool for addressing construct identity in literature reviews and meta-analyses
Published 2016“…We designed and evaluated the construct identity detector (CID), the first tool with large-scale construct identity detection properties and the first tool that does not require respondent data. …”
Get full text
Get full text
Get full text
Article -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
5
Hybrid Genetic Algorithm based Fuzzy Inference System for Data Regression
Published 2023Conference Paper -
6
AI recommendation penetration testing tool for SQL injection: linear regression
Published 2025“…This technique involves the development and implementation of an algorithm designed to improve the efficiency of security evaluations by suggest the suitable penetration testing tools. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Automated system for concrete damage classification identification using various classification techniques in machine learning / Nur Haziqah Mat ... [et al.]
Published 2021“…This invention can recognize a certain damage while the classification of defects is classified according to the features extracted from the images by using GLCM algorithm. The performance of these algorithms is evaluated by dividing the dataset into two sections: testing and training. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Evaluation tool of land suitability for medicinal plants
Published 2019Get full text
Get full text
Get full text
Article -
10
Integration of program evaluation and review technique (PERT), gantt chart and genetic algorithm in project management scheduling
Published 2014“…In this thesis, the discussion on the integration approach, which combines Program Evaluation and Review Technique (PERT), Gantt Chart (GC) and Genetic Algorithm (GA), is carried out. …”
Get full text
Get full text
Get full text
Thesis -
11
Fast and optimal tuning of fractional order PID controller for AVR system based on memorizable-smoothed functional algorithm
Published 2022“…This is because the FOPID has additional control parameters at the derivative and integral parts than the PID controller, which has the advantage to improve the output response of AVR system while retaining the robustness and simple construction as the PID controller. Nevertheless, many existing optimization tools for tuning the FOPID controller, which are based on multi-agent based optimization, require large number of function evaluation in their algorithm that could lead to high computational burden. …”
Get full text
Get full text
Get full text
Article -
12
Challenges of hidden data in the unused area two within executable files
Published 2009“…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
Get full text
Get full text
Get full text
Article -
13
802.11 MAC layer sniffer using spoof detection algorithm / Azwan Abdul Satar
Published 2007“…This paper present a wireless sniffer monitoring tool, as well as the analysis and development process of constructing it. …”
Get full text
Get full text
Thesis -
14
Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks
Published 1999“…Risks are inherently present In all construction projects. Quite often, construction projects fail to achieve their time quality and budget goals. …”
Get full text
Get full text
Thesis -
15
Optimal QoS aware multiple paths web service composition using heuristic algorithms and data mining techniques
Published 2014“…Furthermore, prioritizing the selected QoS criteria is suggested in order to assist clients when choosing the right criteria. Experiments via WEKA tool and simulation prototype were conducted to evaluate the methods used. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
Development and validation of a problem-solving instrument (multiple-choice questions) for computational thinking among trainee teachers in the Klang Valley, Malaysia
Published 2024“…This informs the subsequent quantitative phase, involving the development and validation of the MCQ tool. Key objectives include evaluating content validity, difficulty and discrimination indices, and construct validity. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Prediction of stroke disease using machine learning techniques / Syarifah Adilah Mohamed Yusoff ... [et al.]
Published 2024“…Jupyter Notebook, a phyton-base engine, was employed as a data analytic tool for the purpose of analysing and evaluating all of the models. …”
Get full text
Get full text
Get full text
Article -
18
-
19
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…Algorithm Visualization (AV) is a pedagogical tool that can help learners to see the animation of the step-by-step process of an algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A Conceptual Framework to Aid Attribute Selection in Machine Learning Student Performance Prediction Models
Published 2023“…Though, several constructive techniques facilitate to identify the subset of significant attributes, however, the challenging task is to evaluate if the prediction attributes are meaningful, explicit, and controllable by the students. …”
Article
