Search Results - (( java _ normalization algorithm ) OR ( construct validity window algorithm ))
Search alternatives:
- normalization algorithm »
- construct validity »
- window algorithm »
-
1
-
2
Improving resource management with multi-instance broker scheduling algorithm in hierarchical grid computing
Published 2016“…The designed modules is in the form of algorithms, GridSim, Java Development Kits and Java Language used to support the design process whereas the Netbeans software serves as the platform to simulate the experiment so as to obtain the results. …”
Get full text
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
5
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
6
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
7
Developing individualised therapy for colistin through application of pharmacokinetic model tailored for critically ill Malaysian patients utilizing the HPLC-FLD
Published 2025“…The Non-Parametric Adaptive Grid algorithm within Pmetrics software was used to develop a colistin pharmacokinetic model using meta-analysis data from 15 pharmacokinetic studies, and external validation of the final model was performed in 25 subjects (Malaysian and meta-analysis data). …”
Get full text
Get full text
Thesis -
8
Numerical Modelling of the Electric Vehicle Cabin Cooling
Published 2019“…The study of the cabin cooling system in an Electric Vehicle is vital to understand its energy consumption behaviour, where such information can be acted upon to better optimise and improve the overall energy consumption of the vehicle, thus translating into a longer driving range.Factors that contribute to the total thermal load in a cabin space are modelled, where in Edinburgh has a value of 1880.14 W and 3136.14 W for Kuala Lumpur.Expansion is performed in the construction of the solar thermal load model, which has the capability of calculating solar irradiance based on various inputs, which after validation produces a relative error of 7.17 %. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Blogs Search Engine Adopting RSS Syndication Using Fuzzy Logic
Published 2012“…A prototype is built using visual basic 2008 to validate the proposed blogs search engine. It is a windows application with http connection protocol. …”
Get full text
Get full text
Get full text
Thesis -
10
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…In addition, the proposed M2FS method is developed through WEKA API with Java Programming language using the IDE of Eclipse Java. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A Hybrid Metaheuristic Technique Based on Grey Wolf Optimisation, Symbiotic Organism Search, and Ant Colony Optimisation for Solving Multi-Objective Vehicle Routing Problems
Published 2025“…Based on a single-vehicle optimal route, the algorithm provided the shortest distance, 91.74 km. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure
Published 2015“…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. …”
Get full text
Get full text
Thesis -
13
EEG-Based Person Authentication Modelling Using Incremental Fuzzy-Rough Nearest Neighbour Technique
Published 2016“…The IncFRNN algorithm is able to control the size of training pool using predefined window size threshold. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
Challenges of hidden data in the unused area two within executable files
Published 2009“…Results: The programs were coded in Java computer language and implemented on Pentium PC. …”
Get full text
Get full text
Get full text
Article -
15
Anfis Modelling On Diabetic Ketoacidosis For Unrestricted Food Intake Conditions
Published 2017“…The project has also implemented the optimization process onto the proposed ANFIS model through the hybrid of Genetic Algorithm on the fuzzy membership function of the ANFIS model. …”
Get full text
Get full text
Get full text
Get full text
Thesis
