Search Results - (( construct validating new algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- construct validating »
- java application »
- validating new »
- new algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Inextensible simulation model led to manual construction of new ABS model for every new simulation objective. …”
text::Thesis -
3
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…This new approach of constructing two layers of deniability techniques is done in a manner of defining a protocol to embed and implementing them. …”
Get full text
Get full text
Thesis -
4
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
5
Strategies for effective value management practice in construction industry
Published 2017“…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
-
8
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The output from the DDBC algorithm will be tested and validated through NIST Statistical Test Suite. …”
Get full text
Get full text
Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
Get full text
Get full text
Thesis -
10
Designing new chaotic and hyperchaotic systems for chaos-based cryptography
Published 2019“…Besides that, randomness test results demonstrate that the generated pseudo-random sequences from the multistability regions fail to pass most of the statistical tests. Finally, to choose valid pseudo-random sequences from multistability regions, this thesis constructs a new algorithm based on a new 3D multi-attribute chaotic system exhibiting extreme multistability behaviors. …”
Get full text
Get full text
Thesis -
11
A combinatory algorithm of univariate and multivariate gene selection
Published 2009“…In this paper, we considered new parameters which come up from singular value decomposition and present a combination algorithm for gene selection to integrate the univariate and multivariate approaches and compare it with gene selection based on correlation coefficient with binary output classes to analyze the effect of new parameters. …”
Get full text
Get full text
Get full text
Article -
12
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…In this research we present a new approach of constructing fingerprint database. …”
Get full text
Get full text
Conference or Workshop Item -
13
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A genetic algorithm based fuzzy inference system for pattern classification and rule extraction
Published 2023“…The impetus for developing a new and efficient GA-FIS model arises from the need of constructing fuzzy rules directly from raw data sets that combines good approximation and classification properties with compactness and transparency. …”
Article -
15
-
16
Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan
Published 2015“…From this derivation, we construct the CI for the concentration parameter. Three different methods will be considered in proposing the new CI including mean, median and percentile. …”
Get full text
Get full text
Thesis -
17
New fundamental theory in solving the royalty payment problem / Wan Noor Afifah Wan Ahmad and Suliadi Firdaus Sufahani
Published 2021“…Therefore, this study applied a new modified shooting method which is Sufahani-Ahmad-Newton-Golden-Royalty Algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Cuckoo Search Algorithm-Based Zeta Converter In A Photovoltaic System Under Partial Shading Condition
Published 2021“…To validate the effectiveness of the work, a Cuckoo Search maximum power point tracking model was constructed in MATLAB Simulink using various irradiance patterns for Zeta converter. …”
Get full text
Get full text
Thesis -
19
Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application
Published 2021“…In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
20
A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata
Published 2019“…Furthermore, new models for user profile and news metadata construction are proposed where new properties have been incorporated, namely: Reading Rate, Hotness Rate, and Hotness. …”
Get full text
Get full text
Thesis
