Search Results - (( java application customization algorithm ) OR ( construct validation technique algorithm ))

Refine Results
  1. 1
  2. 2

    A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata by Mohamad Hata, Mohsen

    Published 2019
    “…The protocol defines the procedures which engage two layers of deniability techniques; namely Secret Sharing and Valid Fake Messages. …”
    Get full text
    Get full text
    Thesis
  3. 3
  4. 4
  5. 5

    Optimization of medical image steganography using n-decomposition genetic algorithm by Al-Sarayefi, Bushra Abdullah Shtayt

    Published 2023
    “…To overcome these limitations, this study proposes a technique known as an n-decomposition genetic algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    Strategies for effective value management practice in construction industry by Zulhkiple, A. Bakar

    Published 2017
    “…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  7. 7

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…The Hybrid Cube Encryption Algorithm (HiSea) has been implemented to validate the encryption keys that are generated from the proposed algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Effective gene selection techniques for classification of gene expression data by Yeo, Lee Chin

    Published 2005
    “…The proposed approach is validated using leave one out cross validation (LOOCV). …”
    Get full text
    Get full text
    Thesis
  9. 9

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
    Get full text
    Get full text
    Thesis
  10. 10

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail by Ismail, Khairul Nurmazianna

    Published 2014
    “…Techniques to determine the scope of ontology is by construction competency questions. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Comparison of CPU damage prediction accuracy between certainty factor and forward chaining techniques by Tri Ginanjar Laksana, Ade Rahmat Iskandar, Wan Nooraishya Wan Ahmad

    Published 2024
    “…The suggested algorithm yields the mean accuracy of the certainty factor approach in diagnosing computer damage utilizing the constructed system. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    An Arabic hadith text classification model using convolutional neural network and support vector machine / Mohd Irwan Mazlin by Mazlin, Mohd Irwan

    Published 2022
    “…Fourth, the model is being tested using different stemming techniques, and it found that the model using non-stemming techniques gives higher accuracy with 92%. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Surface reconstruction using grayscale analysis / Nur Hamizah Hamid by Hamid, Nur Hamizah

    Published 2012
    “…In grayscale analysis, by using the depth(z) values from grayscale image, the shape of the 2D frontal facial image will be reconstructed. The proposed algorithm tries to overcome some shortcomings in other technique such as slow and also expansive. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Applying empirical thresholding algorithm for a keystroke dynamics based authentication system by Venugopal, Priya Chaliyath, Viji, Kamalan Saroja Angel

    Published 2019
    “…In this paper, a novel algorithm is proposed to authenticate the legal users based on the empirical threshold values. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat by Chia , Yu Huat

    Published 2024
    “…Shield machines, like earth pressure balance and slurry machines, are pivotal in modern tunnel construction. However, twin tunnel construction in urban areas commonly faces surface settlement (SS) issues, which threaten nearby structures. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    A genetic algorithm based fuzzy inference system for pattern classification and rule extraction by Wong S.Y., Yap K.S., Li X.

    Published 2023
    “…Therefore, our proposed GA-FIS method will first define the membership functions with logical interpretation which is amendable by domain experts to human understanding, and then genetic algorithm serves as an optimization tool to construct the best combination of rules in fuzzy inference system that can achieve higher classification accuracy and gain better interpretability. …”
    Article
  19. 19

    Construction Noise Prediction Using Stochastic Deep Learning by Ooi, Wei Chien

    Published 2022
    “…The impact of construction noise on the health and safety of construction workers is one of the main concerns in the industry. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Mayfly Algorithm for Modelling a Horizontal Flexible Plate Structure by Aida Nur Syafiqah, Shaari, Muhamad Sukri, Hadi, Annisa, Jamali, Intan Zaurah, Mat Darus

    Published 2024
    “…Researchers have devised various approaches to suppress unwanted vibrations, with contemporary studies often employing system identification techniques utilizing swarm intelligence algorithms to construct dynamic models of flexible structures. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article