Search Results - (( construct validity modified algorithm ) OR ( java _ normalization algorithm ))
Search alternatives:
- normalization algorithm »
- construct validity »
-
1
A Comparison Study On Pca_Modular Pca And Lda For Face Recognition
Published 2017Get full text
Get full text
Monograph -
2
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…The designed modules is in the form of algorithms, GridSim, Java Development Kits and Java Language used to support the design process whereas the Netbeans software serves as the platform to simulate the experiment so as to obtain the results. …”
Get full text
Get full text
Get full text
Thesis -
3
-
4
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
5
Variable Neighborhood Descent and Whale Optimization Algorithm for Examination Timetabling Problems at Universiti Malaysia Sarawak
Published 2025“…The model employs a two-level structure, where the first level uses standard soft constraints as the objective function to evaluate solution quality, while the second level dynamically adapts to faculty-specific preferences. A constructive algorithm was developed to generate an initial feasible solution, which was subsequently refined using two primary approaches to evaluate their efficiency: Iterative Threshold Pipe Variable Neighborhood Descent (IT-PVND), and a modified Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
7
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. The framework was subsequently verified and validated through expert reviews and experimental testing. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Wastewater treatment process: a modified model for oxidation pond
Published 2021“…The model has been solved numerically by using the 4th order Runge-Kutta method and a parameter fitting technique namely Nelder-Mead simplex algorithm embedded in MATLAB software. To validate the result, a comparison between the model and the experimental data was carried out and measured by using the root mean squared error (RMSE). …”
Get full text
Get full text
Thesis -
9
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
10
New fundamental theory in solving the royalty payment problem / Wan Noor Afifah Wan Ahmad and Suliadi Firdaus Sufahani
Published 2021“…Therefore, this study applied a new modified shooting method which is Sufahani-Ahmad-Newton-Golden-Royalty Algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
12
Adaptive hybrid fuzzy-proportional plus crisp-integral current control algorithm for shunt active power filter operation
Published 2016“…The effectiveness of the proposed CCA in regulating supply current is validated in both simulation and experimental work. …”
Get full text
Get full text
Article -
13
Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks
Published 1999“…Risks are inherently present In all construction projects. Quite often, construction projects fail to achieve their time quality and budget goals. …”
Get full text
Get full text
Thesis -
14
The accuracy of the gas-kinetic BGK finite difference method for solving 3-D compressible inviscid flows
Published 2011“…The underlying numerical scheme for the solver was based on the collisional Boltzmann model that produces the gas-kinetic BGK (Bhatnagaar-Gross-Krook) scheme. In constructing the desired algorithm, the convection flux terms were discretized by a semi-discrete finite difference method. …”
Get full text
Get full text
Get full text
Proceeding Paper -
15
Model predictive current and reactive power control for multilevel four-leg indirect matrix converter / Hazrul Mohamed Basri
Published 2019“…The predictive algorithm computes the one-step prediction load current and reactive power. …”
Get full text
Get full text
Get full text
Thesis -
16
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
18
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis
