Search Results - (( java adaptation optimization algorithm ) OR ( construct validation process algorithm ))
Search alternatives:
- adaptation optimization »
- construct validation »
- validation process »
- process algorithm »
- java adaptation »
-
1
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
2
Design and analysis of construction and recombination module using Idury Waterman Algorithm for fragment assembly application / Hafifi Mohd Rafi
Published 2012“…The result of the proposed algorithm, verifies the validity of proposed algorithm.…”
Get full text
Get full text
Thesis -
3
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
text::Thesis -
4
-
5
-
6
Transtheoretical model of change for weight control in Malaysian context
Published 2010“…Twenty-seven items of Processes of Change inventory were deleted during the factor structure validation process with many items of the original processes dispersed into different processes. …”
Get full text
Get full text
Get full text
Thesis -
7
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
-
9
A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm
Published 2021“…The proposed approach is suitable for obtaining a policy constructed dynamically on the go during the rollout algorithm. …”
Get full text
Get full text
Article -
10
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
11
Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail
Published 2014“…In the first phase, the ontology element and algorithm techniques should be selected. While in the second phase, the HTML files are uploaded for processing. …”
Get full text
Get full text
Thesis -
12
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2008“…A binary tree method for non-slicing tree construction process is utilized for the placement and area optimization of macro-cell layout in very large scaled integrated (VLSI) design. …”
Get full text
Get full text
Conference or Workshop Item -
13
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…In this research we present a new approach of constructing fingerprint database. We propose a hybrid calibration procedure that combines signal sampling process with path-loss prediction algorithm. …”
Get full text
Get full text
Conference or Workshop Item -
14
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2009Get full text
Working Paper -
15
Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0
Published 2023“…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Agreement options for negotiation on material location decision of housing development
Published 2020“…A support model enables negotiation process in group decision. Decision algorithms are based on the cooperative game theory to develop the agreement options and coalition formation. …”
Get full text
Get full text
Article -
17
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
18
Optimization of medical image steganography using n-decomposition genetic algorithm
Published 2023“…Despite attempts to optimize LSB, these issues persist due to (1) the formulation of the optimization suffering from non-valid implicit constraints, causing inflexibility in reaching optimal embedding, (2) lacking convergence in the searching process, where the message length significantly affects the size of the solution space, and (3) issues of application customizability where different data require more flexibility in controlling the embedding process. …”
Get full text
Get full text
Get full text
Thesis -
19
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology.…”
Get full text
Get full text
Thesis -
20
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The performance analysis in terms of processing speed of the encryption and decryption process of the DDBC algorithm shows minimal differences in both AES and DDBC algorithm despite of the difference method of transformation used in both algorithms. …”
Get full text
Get full text
Thesis
