Search Results - (( java data normalization algorithm ) OR ( construct evaluation _ algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Risk assessment for safety and health algorithm for building construction in Oman by Al-Anbari, Saud Said

    Published 2015
    “…The general objective of this study is to carry out a Risk Assessment for Safety and Health (RASH) algorithm for building construction in Oman and to develop a calculation methodology to evaluate safety and health. …”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    A comparative analysis of Prim, Kruskal, and Reverse-Delete algorithms in optimizing routes within Terengganu’s and Pahang’s attraction road network / Munashahira Mohammad Zahid... by Mohammad Zahid, Munashahira

    Published 2024
    “…The goal is to determine the most effective algorithm for constructing the minimum spanning tree (MST) that minimizes total travel distance. …”
    Get full text
    Get full text
    Thesis
  9. 9

    A tool for addressing construct identity in literature reviews and meta-analyses by Larsen, Kai Rune T., Bong, Chih How

    Published 2016
    “…We designed and evaluated the construct identity detector (CID), the first tool with large-scale construct identity detection properties and the first tool that does not require respondent data. …”
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition by Yahya, Anwar Ali, Mahmod, Ramlan, Ramli, Abd Rahman

    Published 2010
    “…To evaluate the proposed approaches of design, three stages of experiments have been conducted. …”
    Get full text
    Get full text
    Article
  11. 11

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…Therefore, FRA using FRT was constructed and the performance of the FRA was evaluated. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Using algorithmic taxonomy to evaluate lecturer workload by Hashim, Ruhil Hayati, Abdul Hamid, Jamaliah, Selamat, Mohd Hasan, Ibrahim, Hamidah, Abdullah, Rusli, Mohayidin, Mohd Ghazali

    Published 2006
    “…Results of the study highlight the contributions of this algorithmic method in better evaluation of teaching workload for lecture.…”
    Get full text
    Get full text
    Get full text
    Article
  13. 13
  14. 14

    Multi-base number representation in application to scalar multiplication and pairing computation by Mohammed Ismail, Abdelwahed

    Published 2011
    “…Multi-bases number representation is used to construct new versions of Miller’s algorithm. These algorithms are formulated for computing Tate and ate pairing. …”
    Get full text
    Get full text
    Thesis
  15. 15

    An evolutionary based features construction methods for data summarization approach by Rayner Alfred, Suraya Alias, Chin, Kim On

    Published 2015
    “…In the process of summarizing relational data, a genetic algorithm is also applied and several feature scoring measures are evaluated in order to find the best set of relevant constructed features. …”
    Get full text
    Get full text
    Research Report
  16. 16

    A coalition model for efficient indexing in wireless sensor network with random mobility / Hazem Jihad Ali Badarneh by Hazem Jihad , Ali Badarneh

    Published 2021
    “…The second evaluation divides into three scenarios. The first one evaluates Coalition-Based Index-Tree framework independently, without any effect from Dynamic-Coalition framework and Static-Coalition algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Neural Networks Ensemble: Evaluation of Aggregation Algorithms for Forecasting by HASSAN, SAIMA

    Published 2013
    “…The performances ofthese aggregation algorithms ofNNs ensemble were evaluated with the mean absolutepercentage error and symmetric mean absolute percentage error. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A Pairwise Test Suite Generator based on Melody Search Algorithm by Toh, S. Yuen, Al-Omoush, Ala’a A., Foo, W. Wen, Goh, G. Hau, Alsewari, Abdulrahman A.

    Published 2016
    “…The proposed strategy generates the test suite with real-valued variables. A comparative evaluation revealed that the PTMS is efficient in constructing a minimum test suite with the existing strategies.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article