Search Results - (( construct validation technique algorithm ) OR ( java data normalization algorithm ))
Search alternatives:
- normalization algorithm »
- construct validation »
- validation technique »
- data normalization »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks
Published 2012Get full text
Get full text
Conference or Workshop Item -
4
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…The protocol defines the procedures which engage two layers of deniability techniques; namely Secret Sharing and Valid Fake Messages. …”
Get full text
Get full text
Thesis -
5
A Comparison Study On Pca_Modular Pca And Lda For Face Recognition
Published 2017Get full text
Get full text
Monograph -
6
-
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
8
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…To overcome these limitations, this study proposes a technique known as an n-decomposition genetic algorithm. …”
Get full text
Get full text
Get full text
Thesis -
9
Strategies for effective value management practice in construction industry
Published 2017“…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
Effective gene selection techniques for classification of gene expression data
Published 2005“…The proposed approach is validated using leave one out cross validation (LOOCV). …”
Get full text
Get full text
Thesis -
12
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
13
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…Techniques to determine the scope of ontology is by construction competency questions. …”
Get full text
Get full text
Thesis -
14
Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques
Published 2024“…The suggested algorithm yields the mean accuracy of the certainty factor approach in diagnosing computer damage utilizing the constructed system. …”
Get full text
Get full text
Get full text
Article -
15
An Arabic hadith text classification model using convolutional neural network and support vector machine / Mohd Irwan Mazlin
Published 2022“…Fourth, the model is being tested using different stemming techniques, and it found that the model using non-stemming techniques gives higher accuracy with 92%. …”
Get full text
Get full text
Thesis -
16
Surface reconstruction using grayscale analysis / Nur Hamizah Hamid
Published 2012“…In grayscale analysis, by using the depth(z) values from grayscale image, the shape of the 2D frontal facial image will be reconstructed. The proposed algorithm tries to overcome some shortcomings in other technique such as slow and also expansive. …”
Get full text
Get full text
Thesis -
17
Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
Published 2019“…In this paper, a novel algorithm is proposed to authenticate the legal users based on the empirical threshold values. …”
Get full text
Get full text
Get full text
Article -
18
Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat
Published 2024“…Shield machines, like earth pressure balance and slurry machines, are pivotal in modern tunnel construction. However, twin tunnel construction in urban areas commonly faces surface settlement (SS) issues, which threaten nearby structures. …”
Get full text
Get full text
Get full text
Thesis -
19
A genetic algorithm based fuzzy inference system for pattern classification and rule extraction
Published 2023“…Therefore, our proposed GA-FIS method will first define the membership functions with logical interpretation which is amendable by domain experts to human understanding, and then genetic algorithm serves as an optimization tool to construct the best combination of rules in fuzzy inference system that can achieve higher classification accuracy and gain better interpretability. …”
Article -
20
Construction Noise Prediction Using Stochastic Deep Learning
Published 2022“…The impact of construction noise on the health and safety of construction workers is one of the main concerns in the industry. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
