Search Results - (( java application optimisation algorithm ) OR ( construct validation need algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- construct validation »
- java application »
- validation need »
- need algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
3
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
text::Thesis -
4
Hyper-Heuristic Evolutionary Approach for Constructing Decision Tree Classifiers
Published 2021“…Further, the suggested hyper heuristic algorithm constructs significantly comprehensible models as compared to WEKA's J48, CART and other similar decision tree construction strategies. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun
Published 2016“…The developed CTMS has been demonstrated to the eSM and has gone through an evaluation and validation.…”
Get full text
Get full text
Thesis -
6
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
Get full text
Get full text
Get full text
Thesis -
7
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
A genetic algorithm based fuzzy inference system for pattern classification and rule extraction
Published 2023“…The impetus for developing a new and efficient GA-FIS model arises from the need of constructing fuzzy rules directly from raw data sets that combines good approximation and classification properties with compactness and transparency. …”
Article -
9
Agreement options for negotiation on material location decision of housing development
Published 2020“…The objectives are to find a model for agreement options and coalition, to validate the algorithms of the best fit for material locations and to determine how much the proposed agreement option was achieved. …”
Get full text
Get full text
Article -
10
Harmony Search Approach In The Strut And Tie Model To Optimise The Stress Distribution In A Concrete Box Girder
Published 2021“…Optimisation using metaheuristic algorithm could provide an alternative for more efficien t STM construction. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Development and validation of a problem-solving instrument (multiple-choice questions) for computational thinking among trainee teachers in the Klang Valley, Malaysia
Published 2024“…This informs the subsequent quantitative phase, involving the development and validation of the MCQ tool. Key objectives include evaluating content validity, difficulty and discrimination indices, and construct validity. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A resource-aware content adaptation approach for e-learning environment / Mohd Faisal Ibrahim
Published 2017“…A prototype of the proposed architecture was built and validated which the focus is towards determining the decision algorithm precision and measuring the video assimilation. …”
Get full text
Get full text
Thesis -
13
-
14
Mitigation of harmonic current for balanced three-phase power system based on Extended Fryze Adaptive notch filter
Published 2023“…The proposed algorithm also improved the design by eliminating the needs of low pass filter as others time domain algorithms. …”
Get full text
Get full text
Get full text
Article -
15
An Improved Integrative Random Forest for Gene Regulatory Network Inference of Breast Cancer
Published 2018“…Integrative Random Forest for Gene Regulatory Network Inference (iRafNet) is a RF based algorithm which provides a great result in constructing GRN inference by integrating multiple data types. …”
Get full text
Get full text
Get full text
Article -
16
Finite element study on the micromotion of cementless total hip arthroplasty
Published 2011Get full text
Working Paper -
17
Application of system identification method coupled with evolutionary algorithms for the optimization of power consumption in a pem fuel cell propulsion system / Suhadiyana Hanapi
Published 2018“…Secondly, in this research, an empirical dynamic model of the PEM fuel cell system in vehicles was analyzed and validated using the system identification method……”
Get full text
Get full text
Book Section -
18
Automatic Road Network Recognition and Extraction for Urban Planning
Published 2009“…The proposed Hybrid Simple Colour Space Segmentation and Edge Detection (Hybrid SCSS-EDGE) algorithm can perform the tasks fully automatic, where the user only needs to input a high-resolution satellite image and wait for the result. …”
Get full text
Get full text
Get full text
Article -
19
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis -
20
Developing individualised therapy for colistin through application of pharmacokinetic model tailored for critically ill Malaysian patients utilizing the HPLC-FLD
Published 2025“…The Non-Parametric Adaptive Grid algorithm within Pmetrics software was used to develop a colistin pharmacokinetic model using meta-analysis data from 15 pharmacokinetic studies, and external validation of the final model was performed in 25 subjects (Malaysian and meta-analysis data). …”
Get full text
Get full text
Thesis
