Search Results - (( construct validity research algorithm ) OR ( java data normalization algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4

    A self-adaptive agent-based simulation modelling framework for dynamic processes by Ling, Loo Yim, Dr.

    Published 2023
    “…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
    text::Thesis
  5. 5

    Strategies for effective value management practice in construction industry by Zulhkiple, A. Bakar

    Published 2017
    “…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0 by Chong, Agnes Wen Lin

    Published 2023
    “…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  9. 9

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…The Lecturer profile contains information of lecturer teaching load, research, publication and many more. We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Reinforcement learning in risk management for pharmaceutical construction projects: frontiers, challenges, and improvement strategies by Junjia, Yin, Jiawen, Liu, Alias, Aidi Hizami, Haron, Nuzul Azam, Abu Bakar, Nabilah

    Published 2025
    “…Therefore, this paper reviews the practical applications of six algorithms—Deep Q-Network (DQN), Deep Deterministic Policy Gradient (DDPG), and Proximity Policy Optimization (PPO)—in construction safety, temperature control, resource scheduling, and automated equipment optimization, validating the potential of reinforcement learning to effectively manage dynamic risks through adaptive learning. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12

    Hyper-Heuristic Evolutionary Approach for Constructing Decision Tree Classifiers by Kumar, Sunil, Ratnoo, Saroj, Vashishtha, Jyoti

    Published 2021
    “…Further, the suggested hyper heuristic algorithm constructs significantly comprehensible models as compared to WEKA's J48, CART and other similar decision tree construction strategies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Improved dung beetle optimization algorithm and finite element analysis for spindle optimization by Haohao, Ma, As’arry, Azizan, Xuping, Wu, Ismail, Mohd Idris Shah, Ramli, Hafiz Rashidi, Saad, Mohd Sazli, Delgoshaei, Aidin

    Published 2024
    “…This research introduces an integrated optimization methodology for spindle design, combining the improved dung beetle optimization (IDBO) algorithm with finite element analysis (FEA). …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…The Lecturer profile contains information lecturer teaching, research, publication and many more. We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload. …”
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Does organizational culture matter in the relationship between trust and SMEs performance by Gorondutse, Abdullahi Hassan, Abdullah, Haim Hilman

    Published 2018
    “…According to the results, the research constructs have a satisfactory convergent and discriminant validity. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…In this research, emphasis is given on increasing the complexity of a block cipher algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal by Abdul Hamid, Jamaliah, Mohayidin, Mohd Ghazali, Selamat, Mohd Hassan, Ibrahim, Hamidah, Abdullah, Rusli, Hashim, Ruhil Hayati

    Published 2006
    “…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19

    Development of a Negotiation Support Model for Value Management in Construction by UTOMO, CHRISTIONO

    Published 2009
    “…The research objectives are to find a theoretical basis and research approach for negotiation support methodology on VM, to develop a decision model for technical solution options in a satisfying function/cost preferences, to investigate negotiation style and outcome and analyze the correlation between them for the basis of scenarios on the agent system, to develop a model for agreement options and coalition algorithms on value-based decision, to validate the coalition algorithms and introduce an initial model of Negotiation Support for Value Management (NSVM). …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology.…”
    Get full text
    Get full text
    Thesis