Search Results - (( java application customization algorithm ) OR ( construct validation method algorithm ))
Search alternatives:
- customization algorithm »
- construct validation »
- validation method »
- java application »
- method algorithm »
-
1
Strategies for effective value management practice in construction industry
Published 2017“…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
Get full text
Get full text
Article -
3
-
4
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
5
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…The main components of cryptography are the algorithm and the key management. However, an adversary could use coercion method where both components can no longer be reliable. …”
Get full text
Get full text
Thesis -
6
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Article -
7
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Iris data set has been taken from UCO machine learning to assist in testing phase. The validity of the result for this web tool will be determined by the average score of the silhouette method. …”
Get full text
Get full text
Thesis -
8
Improved dung beetle optimization algorithm and finite element analysis for spindle optimization
Published 2024“…Through the combination of the IDBO algorithm and FEA method, the mass of the spindle is reduced from 46.582 kg obtained by the IDBO algorithm solution to 28.479 kg, a total reduction of 38.86%, while meeting design requirements such as maximum total deformation. …”
Get full text
Get full text
Get full text
Article -
9
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Conference or Workshop Item -
10
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
11
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2008“…Furthermore, the robustness of genetic algorithm also has been investigated in order to validate the performance stability in achieving the optimal solution for every runtime. …”
Get full text
Get full text
Conference or Workshop Item -
12
Development of a Negotiation Support Model for Value Management in Construction
Published 2009“…It combines simultaneous triangulation by using case studies and survey methods and sequential triangulation in which results of one method are essential in planning the next method (theoretical mapping, survey research, focus group, case study and conceptual modeling). …”
Get full text
Get full text
Final Year Project -
13
Wi-Fi signal strengths database construction for indoor positioning systems using Wi-Fi RFID
Published 2013“…Compared to existing calibration procedure our method requires only few signal samples from RFID tags to be collected and rest of the database is recovered using path-loss prediction algorithm.…”
Get full text
Get full text
Conference or Workshop Item -
14
Using algorithmic taxonomy to evaluate lecture workload: A case study of services application prototype in the UPM KM portal
Published 2006“…Lecturer workload at universities includes three major categories: teaching, research and services.Teaching workload is influence by various factors such as level taught courses, number of student, credit and contact hour and off campus or on campus course design.The UPM has a KM Portal that contains sets of metadata on lecturer profile and knowledge assets.The Lecturer profile contains information lecturer teaching, research, publication and many more.We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload.This method measures the lecturer teaching workload.The taxonomy is a dynamic hierarchy that extracts validated parameters from the dataset.Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2009Get full text
Working Paper -
16
Confidence intervals (CI) for concentration parameter in von Mises distribution and analysis of missing values for circular data / Siti Fatimah binti Hassan
Published 2015“…In this study, three imputation methods are considered namely expectation-maximization (EM) algorithm and data augmentation (DA) algorithm. …”
Get full text
Get full text
Thesis -
17
Reinforcement learning in risk management for pharmaceutical construction projects: frontiers, challenges, and improvement strategies
Published 2025“…The intelligent construction of pharmaceutical facilities faces dynamic and nonlinear risks, and traditional management methods struggle to meet the high demands for real-time response and compliance. …”
Get full text
Get full text
Get full text
Article -
18
Harmony Search Approach In The Strut And Tie Model To Optimise The Stress Distribution In A Concrete Box Girder
Published 2021“…Optimisation using metaheuristic algorithm could provide an alternative for more efficien t STM construction. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
A combinatory algorithm of univariate and multivariate gene selection
Published 2009“…Gene selection is usually based on univariate or multivariate methods. Univariate methods for gene selection cannot address interactions among multiple genes, a situation which demands the multivariate methods [1], [2]. …”
Get full text
Get full text
Get full text
Article -
20
Fused multivariate empirical mode decomposition (MEMD) and inverse solution method for EEG source localization
Published 2018“…We also developed an unsupervised algorithm utilizing a wavelet method to remove eye blink artifacts. …”
Get full text
Get full text
Article
