Search Results - (( construct validity design algorithm ) OR ( java data normalization algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Strategies for effective value management practice in construction industry by Zulhkiple, A. Bakar

    Published 2017
    “…The investigated VM methods involved conducting building value analysis in the design stage. To demonstrate the validity and efficiency of the proposed optimisation algorithm, various case studies were conducted in Malaysia. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Improved dung beetle optimization algorithm and finite element analysis for spindle optimization by Haohao, Ma, As’arry, Azizan, Xuping, Wu, Ismail, Mohd Idris Shah, Ramli, Hafiz Rashidi, Saad, Mohd Sazli, Delgoshaei, Aidin

    Published 2024
    “…Modal analysis up to the sixth order validates the design correctness reveals dynamic spindle behavior and guarantees the design requirements. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The steps are problem definition, construct the simulation model, test and validate the model, design the simulation experiments, conduct the simulation experiments, evaluate the result and implement the result. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    User interface and interactivity design guidelines of algorithm visualization on mobile platform by Supli, Ahmad Affandi

    Published 2019
    “…The proposed design guidelines were validated through expert reviews, which involved 16 experts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree by Rahim At Samsuddin, H. A., Ab. Rahman, A. A. H., Andaljayalakshmi, G., Ahmad, R. B.

    Published 2008
    “…A binary tree method for non-slicing tree construction process is utilized for the placement and area optimization of macro-cell layout in very large scaled integrated (VLSI) design. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13
  14. 14

    Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun by Wan Harun, Wan Muhammad Aqil

    Published 2016
    “…The project produces a numbers of prototypes, Software Requirement Specification (SRS) and System Design Document (SDD). The developed CTMS has been demonstrated to the eSM and has gone through an evaluation and validation.…”
    Get full text
    Get full text
    Thesis
  15. 15

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…The Lecturer profile contains information of lecturer teaching load, research, publication and many more. We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…Somehow, the substitution box (s-box) in the AES block cipher is fixed or static for all rounds and has become the target of many attacks. The design of the s-box is the most crucial part while designing a new block cipher algorithm since it is the only non-linear element of the cipher. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Development of a Negotiation Support Model for Value Management in Construction by UTOMO, CHRISTIONO

    Published 2009
    “…The negotiation support bridges theoretical gap between automated design in construction domain and automated negotiation in information technology domain by providing a structured methodology which can lead to systematic support system and automated negotiation for VM process. …”
    Get full text
    Get full text
    Final Year Project