Search Results - (( construct validity using algorithm ) OR ( java _ normalization algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Design and analysis of construction and recombination module using Idury Waterman Algorithm for fragment assembly application / Hafifi Mohd Rafi by Mohd Rafi, Hafifi

    Published 2012
    “…There is several algorithms use in sequencing of DNA fragment. This paper presents a study on design and analysis of construction and recombination module using IduryWaterman algorithm and fragment assembly application using Verilog. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing by Yahaya, Bakri

    Published 2016
    “…The designed modules is in the form of algorithms, GridSim, Java Development Kits and Java Language used to support the design process whereas the Netbeans software serves as the platform to simulate the experiment so as to obtain the results. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)... by Pradhan, Biswajeet, Mohammad Zare, Pourghasemi, Hamid Reza, Vafakhah, Mahdi

    Published 2013
    “…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7
  8. 8

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Strategies for effective value management practice in construction industry by Zulhkiple, A. Bakar

    Published 2017
    “…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks by Abd Aziz, Azrina, Sekercioglu, Ahmet

    Published 2012
    “…Our algorithm, a single-phase single initiator (SPSI), only requires a single phase to construct a CDS in a distributed manner using localized information. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0 by Chong, Agnes Wen Lin

    Published 2023
    “…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18
  19. 19
  20. 20