Search Results - (( construct validity level algorithm ) OR ( java application customization algorithm ))

Refine Results
  1. 1

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…In this research we present a new approach of constructing fingerprint database. We propose a hybrid calibration procedure that combines signal sampling process with path-loss prediction algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  4. 4

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…The Lecturer profile contains information of lecturer teaching load, research, publication and many more. We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…The Lecturer profile contains information lecturer teaching, research, publication and many more. We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Conference or Workshop Item
  7. 7

    Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak by Emily Sing Kiang, Siew

    Published 2025
    “…Future studies could expand the scope of datasets to validate the centralized framework at the full institutional level rather than only at selected faculties. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Enhanced weight-optimized recurrent neural networks based on sine cosine algorithm for wave height prediction by Alqushaibi, A., Abdulkadir, S.J., Rais, H.M., Al-Tashi, Q., Ragab, M.G., Alhussian, H.

    Published 2021
    “…Constructing offshore and coastal structures with the highest level of stability and lowest cost, as well as the prevention of faulty risk, is the desired plan that stakeholders seek to obtain. …”
    Get full text
    Get full text
    Article
  9. 9

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…This research also proposes a new method namely RotateSwapDeterminant function that uses rotation and swapping of the bit based on the 4x4 determinant computations and will act as the permutation layer in the DDBC algorithm. The output from the DDBC algorithm will be tested and validated through NIST Statistical Test Suite. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Construction Noise Prediction Using Stochastic Deep Learning by Ooi, Wei Chien

    Published 2022
    “…The deep learning model was trained with stochastic data to predict the noise levels emitted from the construction site. The programming algorithm of stochastic modelling was executed in MATLAB, whereas the deep learning model was established by using Python 3.6 programming language in Spyder. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  12. 12

    Effective gene selection techniques for classification of gene expression data by Yeo, Lee Chin

    Published 2005
    “…The proposed approach is validated using leave one out cross validation (LOOCV). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Mayfly Algorithm for Modelling a Horizontal Flexible Plate Structure by Aida Nur Syafiqah, Shaari, Muhamad Sukri, Hadi, Annisa, Jamali, Intan Zaurah, Mat Darus

    Published 2024
    “…Yet, MA adeptly depicted the characteristics of the system, outperforming the RLS in these validation by indicating a 95% confidence level in the correlation test and exhibiting robust stability in the pole-zero diagram. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    A combinatory algorithm of univariate and multivariate gene selection by Mahmoodian, Sayed Hamid, Marhaban, Mohammad Hamiruce, Abdul Rahim, Raha, Rosli, Rozita, Saripan, M. Iqbal

    Published 2009
    “…The results show that the mean of misclassification error of training samples in 100 iteration are almost equal in two algorithms but our algorithm have the better ability to classify independent samples.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    An automated approach to elicit and validate security requirements of mobile application by Yusop, Noorrezam

    Published 2018
    “…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques by Tri Ginanjar Laksana, Ade Rahmat Iskandar, Wan Nooraishya Wan Ahmad

    Published 2024
    “…The suggested algorithm yields the mean accuracy of the certainty factor approach in diagnosing computer damage utilizing the constructed system. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A three-level universal electric vehicle charger based on voltage-oriented control and pulse-width modulation by Al-Ogaili, Ali Saadon Mtair, Aris, Ishak, Verayiah, Renuga, Ramasamy, Agileswari, Marsadek, Marayati, Rahmat, Nur Azzammudin, Hoon, Yap, Aljanad, Ahmed, Al-Masri, Ahmed N.

    Published 2019
    “…Moreover, a laboratory prototype was constructed with a TMS320F28335 digital signal processor (DSP) programmed as the controller to validate its operation and performance. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Efficient gear fault feature selection based on moth‑flame optimisation in discrete wavelet packet analysis domain by Ong, Pauline, Tieh, Tony Hieng Cai, Lai, Kee Huong, Lee, Woon Kiow, Ismon, Maznan

    Published 2019
    “…First, the vibration signals of gear with different fault conditions were decomposed by a fourth-level discrete wavelet packet transform, and the statistical features at all constructed nodes were derived. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks by Mohammed Omer, Anwar

    Published 1999
    “…It is a formal orderly process for systematically identifying, analysing and responding to risks associated with construction projects so as to reduce the effects of these risks to an acceptable level. …”
    Get full text
    Get full text
    Thesis