Search Results - (( java application customization algorithm ) OR ( construct validity concept algorithm ))

  • Showing 1 - 18 results of 18
Refine Results
  1. 1
  2. 2

    Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0 by Chong, Agnes Wen Lin

    Published 2023
    “…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    m-polar generalization of fuzzy T-ordering relations: an approach to group decision making by Khameneh, Azadeh Zahedi, Kilicman, Adem

    Published 2020
    “…Two algorithms for solving ranking problem in decision-making are proposed and validated by an illustrative example.…”
    Get full text
    Get full text
    Article
  4. 4

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Does organizational culture matter in the relationship between trust and SMEs performance by Gorondutse, Abdullahi Hassan, Abdullah, Haim Hilman

    Published 2018
    “…Findings – The research findings were established using SmartPLS Algorithm and bootstrapping functions. According to the results, the research constructs have a satisfactory convergent and discriminant validity. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Development of durian ontology from unstructured text and external knowledge source / Khairul Nurmazianna Ismail by Ismail, Khairul Nurmazianna

    Published 2014
    “…Furthermore in reuse knowledge model phase, it produces initial and domain expert verified ontology element. In ontology validation phase, it shows the validation results using competency questions and Agrovoc concept alignment. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Fuzzy parameterized complex multi-fuzzy soft expert set theory and its application in decision-making by Al-Qudah, Yousef Ali Abed, Hassan, Mazlan, Hassan, Nasruddin

    Published 2019
    “…We then construct an algorithm based on this concept by converting it from the complex state to the real state. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Computational methods for self-assembly of DNA nanostructures / Ong Hui San by Ong, Hui San

    Published 2016
    “…Several approaches have been adopted including development of an autonomous tool that incorporated evolutionary optimization algorithm in constructing these heterogeneous DNA shapes and the application of heuristic through undirected graph theory as an annotation schema to produce the connectivity maps. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Time-Uncertainty Analysis by Using Simulation in Project Scheduling Networks by Mohammed Omer, Anwar

    Published 1999
    “…Risks are inherently present In all construction projects. Quite often, construction projects fail to achieve their time quality and budget goals. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Combinatorial interaction testing of software product lines: a mapping study by Sahid, Mohd Zanes, Md Sultan, Abu Bakar, Abdul Ghani, Abdul Azim, Baharom, Salmi

    Published 2016
    “…This paper reports a systematic mapping study (SMS) of relevant primary studies as the evidence on the application of Combinatorial Interaction Testing (CIT) for SPL. In CIT, one has to construct a covering array, which is a set of configurations having valid feature combinations and every combination of t features appears at least once in the array. …”
    Get full text
    Get full text
    Article
  11. 11

    Design & Development of a Robotic System Using LEGO Mindstorm by Abd Manap, Nurulfajar, Md Salim, Sani Irwan, Haron, Nor Zaidi

    Published 2006
    “…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12
  13. 13

    Tourism Sustainable Competitiveness Indicator in Malaysia: Construct and Forecasting Ability by Ann Ni, Soh

    Published 2023
    “…The core framework of the constructed TSCI was selected based on a rigorous variable importance assessment using random forest algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14

    Performance improvement through optimal location and sizing of distributed generation / Zuhaila Mat Yasin by Mat Yasin, Zuhaila

    Published 2014
    “…To enhance the robustness of the algorithm, the QIEP technique is constructed based on multiobjective model in which the multiobjective functions consist of reducing power losses, increasing maximum loadability and cost minimisation. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Model predictive current and reactive power control for multilevel four-leg indirect matrix converter / Hazrul Mohamed Basri by Hazrul , Mohamed Basri

    Published 2019
    “…Its energy storage-less structure enables the construction of a compact power converter circuit. The feature of IMC was extended with multilevel concept to improve the output waveform quality by unifying the conventional four-leg indirect matrix converter with a four-switch circuit resembling a dual asynchronous buck-circuit to synthesise the multilevel output voltage. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Cryptanalysis on the modulus N=p2q and design of rabin-like cryptosystem without decryption failure by Asbullah, Muhammad Asyraf

    Published 2015
    “…Moreover, for the purpose of empirical evidences, some parameters are chosen in the course of the process to validate the efficiency in terms of algorithmic running time and memory consumptions. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Local and global measures for measuring performance of big data analytics process by Ali, Ismail Mohamed

    Published 2019
    “…The results of confirmation study demonstrated the reliability and validity of the proposed model. The results also revealed the relationships among model constructs, namely: efficiency, effectiveness, technology, competency, and working conditions. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
    Get full text
    Get full text
    Thesis