Search Results - (( java application customization algorithm ) OR ( construct validity based algorithm ))
Search alternatives:
- customization algorithm »
- construct validity »
- java application »
-
1
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
2
The Construction Of Quantum Block Cipher For Grover Algorithm
Published 2018Get full text
Get full text
Thesis -
3
A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm
Published 2021“…The proposed approach is suitable for obtaining a policy constructed dynamically on the go during the rollout algorithm. …”
Get full text
Get full text
Article -
4
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
text::Thesis -
5
A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks
Published 2012“…The performance of our algorithm is confirmed through simulations and validated against two leading CDS algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
6
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…The study on related work and comparison of algorithm also has been done in this phase. In Design phase, the use case diagram, whole system flowchart and subsystem flowchart has been constructed to assist the development of this web tool. …”
Get full text
Get full text
Thesis -
7
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Enhanced weight-optimized recurrent neural networks based on sine cosine algorithm for wave height prediction
Published 2021“…This paper proposes an enhanced weight-optimized neural network based on Sine Cosine Algorithm (SCA) to accurately predict the wave height. …”
Get full text
Get full text
Article -
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
10
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
-
13
Development of a Negotiation Support Model for Value Management in Construction
Published 2009“…It consists of developing the appropriate research approach, methodology of negotiation and agent-based negotiation in VM. The research objectives are to find a theoretical basis and research approach for negotiation support methodology on VM, to develop a decision model for technical solution options in a satisfying function/cost preferences, to investigate negotiation style and outcome and analyze the correlation between them for the basis of scenarios on the agent system, to develop a model for agreement options and coalition algorithms on value-based decision, to validate the coalition algorithms and introduce an initial model of Negotiation Support for Value Management (NSVM). …”
Get full text
Get full text
Final Year Project -
14
-
15
m-polar generalization of fuzzy T-ordering relations: an approach to group decision making
Published 2020“…Two algorithms for solving ranking problem in decision-making are proposed and validated by an illustrative example.…”
Get full text
Get full text
Article -
16
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The output from the DDBC algorithm will be tested and validated through NIST Statistical Test Suite. …”
Get full text
Get full text
Thesis -
17
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…The Lecturer profile contains information of lecturer teaching load, research, publication and many more. We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
Get full text
Get full text
Get full text
Article -
18
Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun
Published 2016“…CTMS are embedded with dynamic match making using genetic algorithm that can pairs players based on variation combination of criteria such as player’s gender, points and nation. …”
Get full text
Get full text
Thesis -
19
Applying empirical thresholding algorithm for a keystroke dynamics based authentication system
Published 2019“…In this paper, a novel algorithm is proposed to authenticate the legal users based on the empirical threshold values. …”
Get full text
Get full text
Get full text
Article -
20
A genetic algorithm based fuzzy inference system for pattern classification and rule extraction
Published 2023“…This paper presents a genetic-algorithm-based fuzzy inference system for extracting highly comprehensible fuzzy rules to be implemented in human practices without detailed computation (hereafter denoted as GA-FIS). …”
Article
