Search Results - (( developing constructing motivation algorithm ) OR ( java implication tree algorithm ))

Refine Results
  1. 1
  2. 2

    An analysis of the parameter modifications in varieties of harmony search algorithm by Nur Farraliza, Mansor, Zuraida, Abal Abas, Ahmad Fadzli Nizam, Abdul Rahman

    Published 2014
    “…This analysis provides a useful motivation for researchers interested to improve the achievement of the standard HS algorithm and enhance the solution convergence rate and flexibility.…”
    Get full text
    Get full text
    Article
  3. 3

    An analysis of the parameter modifications in varieties of harmony search algorithm by Mansor, N. F., Abal Abas, Zuraida, Abdul Rahman, Ahmad Fadzli Nizam, Shibghatullah, Abdul Samad, Safiah , Sidek

    Published 2014
    “…This analysis provides a useful motivation for researchers interested to improve the achievement of the standard HS algorithm and enhance the solution convergence rate and flexibility.…”
    Get full text
    Get full text
    Article
  4. 4

    Optimised Crossover Genetic Algorithms for Combinatorial Optimisation Problems by Nazif, Habibeh

    Published 2010
    “…This thesis focuses on the development of a new stream of crossover within genetic algorithms, called Optimised Crossover Genetic Algorithm (OCGA) for solving combinatorial optimisation problems, which takes into account the objective function in finding the best ofspring solution among an exponentially large number of potential ofspring. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Clustering Approach In Wireless Sensor Networks Based On K-Means: Limitations And Recommendations by Hassan, Ali Abdul-hussian, Md Shah, Wahidah, Husien, Ali Mohamed, Talib, Mohammed Saad, Mohammed, Ali Abdul Jabbar, Othman, Mohd Fairuz Iskandar

    Published 2019
    “…This algorithm has beneficial in construct the clusters for various real-world applications of WSN.K-means algorithm suffering from many drawbacks that hampering his work.The lack of adequate studies that investigates in the limitations of this algorithm and seek to propose the solutions motivated us to do this study. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players by Mohammad Zukuwwan, Zainol Abidin

    Published 2021
    “…This system can help coaches to solve problem regarding the strong team development with available players and motivate the use of decision technologies in sports able to match the results from the real world implementation.…”
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Survey on language processing algorithm for sign language synthesizer by Maarif, Haris Al Qodri, Akmeliawati, Rini, Gunawan, Teddy Surya

    Published 2017
    “…In this paper, we provide a comprehensive review on the work in SL synthesizer development. SL synthesizer is a tool that synthesizes or constructs series of signs of a particular SL based on the speech input given to the system. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Blind signature / Musfirah Mohd Ali by Musfirah, Mohd Ali

    Published 2005
    “…The first chapter is about the objectives, motivations, scope and limitation of this project. Then, in order to construct the blind signature system that used an appropriate kind of method, the author did a deep research and comparison on the existing cryptography, programming languages, algorithms and systems which are explained in chapter two of this project. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    Development Of Two New Auxiliary Information Control Charts, And Economic And Economic-Statistical Designs Of Several Auxiliary Information Control Charts by Ng Peh, Sang

    Published 2020
    “…Optimal parameters computed using the optimization algorithms developed and the step-by-step approach for constructing the optimal RS - AI chart are provided in this thesis. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Automatically generating a sentiment lexicon for the Malay language by Mohammad Darwich, Shahrul Azman Mohd Noah, Nazlia Omar

    Published 2016
    “…This has brought up the motivation to propose a sentiment lexicon generation algorithm for this language. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    A NOVEL CONSTRUCTION OF VECTOR COMBINATORIAL (VC) CODE FAMILIES AND DETECTION SCHEME FOR SAC OCDMA SYSTEMS by AHMED MOHMED, HASSAN YOUSIF

    Published 2010
    “…Firstly, a comprehensive discussion takes place on all important aspects of existing codes from advantages and disadvantages point of view. Two algorithms are proposed to construct several code families namely Vector Combinatorial (VC). …”
    Get full text
    Get full text
    Thesis
  13. 13

    Family of singly diagonally implicit block backward differentiation formulas for solving stiff ordinary differential equations by Saufianim, Jana Aksah

    Published 2021
    “…A new family of singly diagonally implicit block backward differentiation formulas (SDIBBDF) for solving first and second order stiff ordinary differential equations (ODEs) are developed. Motivation in developing the SDIBBDF method arises from the singly diagonally implicit properties that are widely used by researchers in Runge-Kutta (RK) families to improve efficiency of the classical methods. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    A Wavelet-Based Approach For The Analytical Solutions Of Fractional Differential Equations And The Numerical Solutions Of Fractional Integral Equations by Loong, Marcus Ong Wei

    Published 2024
    “…Motivated by the prowess of the legendre wavelet in solving fractional differential equations numerically, this thesis strives to construct a numerical scheme based on this wavelet for fractional integral equations.…”
    Get full text
    Get full text
    Thesis
  16. 16

    Tourism Sustainable Competitiveness Indicator in Malaysia: Construct and Forecasting Ability by Ann Ni, Soh

    Published 2023
    “…The core framework of the constructed TSCI was selected based on a rigorous variable importance assessment using random forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    A Hybrid Machine Learning and Optimisation-Based Model for Predicting the Success of Business-To-Consumer Software Development Projects in Indonesia by Setiawan, Rudi

    Published 2025
    “…Building on these findings, a predictive framework is constructed by integrating machine learning algorithms with advanced optimization and data handling strategies. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Development Of The Readability Index Model For Young Adults With Reading Difficulties In Malay Language by Mohamad Hazawawi, Nur Amalina

    Published 2019
    “…Due to the unavailability of a tool that can measures the readability levels of Malay texts, this study proposed an online readability test tool in the Malay language to include readers who have reading difficulties by using an existing conventional calculation method developed by the Malay linguists. This formula was then transformed into a computing algorithm to detect the difficult words in Malay texts. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19
  20. 20

    An automated approach to elicit and validate security requirements of mobile application by Yusop, Noorrezam

    Published 2018
    “…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
    Get full text
    Get full text
    Get full text
    Thesis