Search Results - (( construct validity concept algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- construct validity »
- concept algorithm »
- java application »
-
1
Design and analysis of construction and recombination module using Idury Waterman Algorithm for fragment assembly application / Hafifi Mohd Rafi
Published 2012“…The result of the proposed algorithm, verifies the validity of proposed algorithm.…”
Get full text
Get full text
Thesis -
2
Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0
Published 2023“…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
m-polar generalization of fuzzy T-ordering relations: an approach to group decision making
Published 2020“…Two algorithms for solving ranking problem in decision-making are proposed and validated by an illustrative example.…”
Get full text
Get full text
Article -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
5
Does organizational culture matter in the relationship between trust and SMEs performance
Published 2018“…Findings – The research findings were established using SmartPLS Algorithm and bootstrapping functions. According to the results, the research constructs have a satisfactory convergent and discriminant validity. …”
Get full text
Get full text
Get full text
Article -
6
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…Furthermore in reuse knowledge model phase, it produces initial and domain expert verified ontology element. In ontology validation phase, it shows the validation results using competency questions and Agrovoc concept alignment. …”
Get full text
Get full text
Thesis -
7
Fuzzy parameterized complex multi-fuzzy soft expert set theory and its application in decision-making
Published 2019“…We then construct an algorithm based on this concept by converting it from the complex state to the real state. …”
Get full text
Get full text
Get full text
Article -
8
Computational methods for self-assembly of DNA nanostructures / Ong Hui San
Published 2016“…Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
Get full text
Get full text
Thesis -
9
Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks
Published 1999“…Risks are inherently present In all construction projects. Quite often, construction projects fail to achieve their time quality and budget goals. …”
Get full text
Get full text
Thesis -
10
Combinatorial interaction testing of software product lines: a mapping study
Published 2016“…This paper reports a systematic mapping study (SMS) of relevant primary studies as the evidence on the application of Combinatorial Interaction Testing (CIT) for SPL. In CIT, one has to construct a covering array, which is a set of configurations having valid feature combinations and every combination of t features appears at least once in the array. …”
Get full text
Get full text
Article -
11
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
STUDY OF THE MICRO UNMANNED AERIAL VEHICLE (MUAV) VERTICAL TAKE-OFF AND LANDING (VTOL) CONTROL SYSTEM
Published 2011Get full text
Get full text
Final Year Project -
13
Tourism Sustainable Competitiveness Indicator in Malaysia: Construct and Forecasting Ability
Published 2023“…The core framework of the constructed TSCI was selected based on a rigorous variable importance assessment using random forest algorithm. …”
Get full text
Get full text
Get full text
Thesis -
14
Performance improvement through optimal location and sizing of distributed generation / Zuhaila Mat Yasin
Published 2014“…To enhance the robustness of the algorithm, the QIEP technique is constructed based on multiobjective model in which the multiobjective functions consist of reducing power losses, increasing maximum loadability and cost minimisation. …”
Get full text
Get full text
Thesis -
15
Model predictive current and reactive power control for multilevel four-leg indirect matrix converter / Hazrul Mohamed Basri
Published 2019“…Its energy storage-less structure enables the construction of a compact power converter circuit. The feature of IMC was extended with multilevel concept to improve the output waveform quality by unifying the conventional four-leg indirect matrix converter with a four-switch circuit resembling a dual asynchronous buck-circuit to synthesise the multilevel output voltage. …”
Get full text
Get full text
Get full text
Thesis -
16
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. …”
Get full text
Get full text
Thesis -
17
Local and global measures for measuring performance of big data analytics process
Published 2019“…The results of confirmation study demonstrated the reliability and validity of the proposed model. The results also revealed the relationships among model constructs, namely: efficiency, effectiveness, technology, competency, and working conditions. …”
Get full text
Get full text
Thesis -
18
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
Get full text
Get full text
Thesis
