Search Results - (( construct validity tests algorithm ) OR ( java data selection algorithm ))
Search alternatives:
- selection algorithm »
- construct validity »
- tests algorithm »
- validity tests »
- data selection »
- java »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Then canonical Polyadic decomposition-based attribute reduction is applied to the offload-able task to reduce the data size. Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
2
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
3
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
Get full text
Thesis -
4
-
5
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…The results also show that in Java, A Arraylist is the most suitable choice for storing Object and Arraylnt list is the most suitablec choice for storing integer data. …”
Get full text
Get full text
Thesis -
6
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
8
Reducing of Inconsistent Data using Fuzzy Multi Attribute Decision Making for Accessing Data from Database
Published 2013“…Sample data was selected for experiments purposes. The result indicates fuzzy multi attribute decision making is a suitable technique in reducing inconsistent data from database. …”
Get full text
Get full text
Article -
9
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The steps are problem definition, construct the simulation model, test and validate the model, design the simulation experiments, conduct the simulation experiments, evaluate the result and implement the result. …”
Get full text
Get full text
Get full text
Thesis -
10
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Lastly, on the Testing phase two type of data has been used to test this web tool result. …”
Get full text
Get full text
Thesis -
11
Image clustering comparison of two color segmentation techniques
Published 2010“…The clustering research is regarding the area of data mining and implementation of the clustering algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…This research also proposes a new method namely RotateSwapDeterminant function that uses rotation and swapping of the bit based on the 4x4 determinant computations and will act as the permutation layer in the DDBC algorithm. The output from the DDBC algorithm will be tested and validated through NIST Statistical Test Suite. …”
Get full text
Get full text
Thesis -
13
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The research’s primary objective is to construct a framework for prioritising test cases in regression testing using swarm intelligence that enhances test efficiency and effectiveness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
text::Thesis -
15
Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0
Published 2023“…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
17
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…Evaluations of algorithms reveal that the proposed algorithm has achieved a level of security and complexity that is 48 times superior to that of other methods that have been tried and tested. …”
Get full text
Get full text
Get full text
Thesis -
18
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…Moreover, the evaluation of the effectiveness of the AVOMP prototype from 35 participants through laboratory experiments based on the bloom taxonomy test shows that there is a significant difference between students learning sorting algorithms using the manual approach (Pre-Test) and the AVOMP app (Post-Test). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
Get full text
Get full text
Thesis -
20
Effective gene selection techniques for classification of gene expression data
Published 2005“…The proposed approach is validated using leave one out cross validation (LOOCV). …”
Get full text
Get full text
Thesis
