Search Results - (( java application customization algorithm ) OR ( construct validating new algorithm ))

Refine Results
  1. 1

    A self-adaptive agent-based simulation modelling framework for dynamic processes by Ling, Loo Yim, Dr.

    Published 2023
    “…Inextensible simulation model led to manual construction of new ABS model for every new simulation objective. …”
    text::Thesis
  2. 2

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…This new approach of constructing two layers of deniability techniques is done in a manner of defining a protocol to embed and implementing them. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Strategies for effective value management practice in construction industry by Zulhkiple, A. Bakar

    Published 2017
    “…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Dynamic determinant matrix-based block cipher algorithm by Juremi, Julia

    Published 2018
    “…The output from the DDBC algorithm will be tested and validated through NIST Statistical Test Suite. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…Besides that, randomness test results demonstrate that the generated pseudo-random sequences from the multistability regions fail to pass most of the statistical tests. Finally, to choose valid pseudo-random sequences from multistability regions, this thesis constructs a new algorithm based on a new 3D multi-attribute chaotic system exhibiting extreme multistability behaviors. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A combinatory algorithm of univariate and multivariate gene selection by Mahmoodian, Sayed Hamid, Marhaban, Mohammad Hamiruce, Abdul Rahim, Raha, Rosli, Rozita, Saripan, M. Iqbal

    Published 2009
    “…In this paper, we considered new parameters which come up from singular value decomposition and present a combination algorithm for gene selection to integrate the univariate and multivariate approaches and compare it with gene selection based on correlation coefficient with binary output classes to analyze the effect of new parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID by Narzullaev, Anvar, Selamat, Mohd Hasan

    Published 2013
    “…In this research we present a new approach of constructing fingerprint database. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system by Maseer, Ziadoon Kamil

    Published 2022
    “…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13

    A genetic algorithm based fuzzy inference system for pattern classification and rule extraction by Wong S.Y., Yap K.S., Li X.

    Published 2023
    “…The impetus for developing a new and efficient GA-FIS model arises from the need of constructing fuzzy rules directly from raw data sets that combines good approximation and classification properties with compactness and transparency. …”
    Article
  14. 14
  15. 15

    Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan by Hassan, Siti Fatimah

    Published 2015
    “…From this derivation, we construct the CI for the concentration parameter. Three different methods will be considered in proposing the new CI including mean, median and percentile. …”
    Get full text
    Get full text
    Thesis
  16. 16

    New fundamental theory in solving the royalty payment problem / Wan Noor Afifah Wan Ahmad and Suliadi Firdaus Sufahani by Wan Ahmad, Wan Noor Afifah, Sufahani, Suliadi Firdaus

    Published 2021
    “…Therefore, this study applied a new modified shooting method which is Sufahani-Ahmad-Newton-Golden-Royalty Algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Cuckoo Search Algorithm-Based Zeta Converter In A Photovoltaic System Under Partial Shading Condition by Lourdes, Jotham Jeremy

    Published 2021
    “…To validate the effectiveness of the work, a Cuckoo Search maximum power point tracking model was constructed in MATLAB Simulink using various irradiance patterns for Zeta converter. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancement Of Static Code Analysis Malware Detection Framework For Android Category-Based Application by Aminordin, Azmi

    Published 2021
    “…In increasing the reliability, the results obtained are then validated by using statistical analysis procedure which each machine learning classification algorithm are iterate 50 times. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata by Darvishy, Asghar

    Published 2019
    “…Furthermore, new models for user profile and news metadata construction are proposed where new properties have been incorporated, namely: Reading Rate, Hotness Rate, and Hotness. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…The developed framework, grounded in fault-based testing theory, comprises three key components: inputs, prioritization factors, and a prioritization algorithm. The framework was subsequently verified and validated through expert reviews and experimental testing. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis