Search Results - (( java data normalization algorithm ) OR ( construct validation a algorithm ))

Refine Results
  1. 1

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…Even a normal people using clustering to grouping their data. …”
    Get full text
    Get full text
    Thesis
  2. 2

    SANAsms: Secure short messaging system for secure GSM mobile communication by Anuar, N.B., Azlan, I.M., Wahid, A.W.A., Zakaria, O.

    Published 2008
    “…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)... by Pradhan, Biswajeet, Mohammad Zare, Pourghasemi, Hamid Reza, Vafakhah, Mahdi

    Published 2013
    “…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Strategies for effective value management practice in construction industry by Zulhkiple, A. Bakar

    Published 2017
    “…The objectives were to develop a new optimisation algorithm and apply the results to control construction project costs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube by Mushtaq, Muhammad Faheem

    Published 2019
    “…This research proposed a new Key Schedule Algorithm based on the coordinate geometry of a Hybrid Cube (KSAHC) for the non-binary block cipher. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10

    A Distributed Energy Aware Connected Dominating Set Technique for Wireless Sensor Networks by Abd Aziz, Azrina, Sekercioglu, Ahmet

    Published 2012
    “…Our algorithm, a single-phase single initiator (SPSI), only requires a single phase to construct a CDS in a distributed manner using localized information. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12
  13. 13
  14. 14

    A self-adaptive agent-based simulation modelling framework for dynamic processes by Ling, Loo Yim, Dr.

    Published 2023
    “…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
    text::Thesis
  15. 15

    Hyper-Heuristic Evolutionary Approach for Constructing Decision Tree Classifiers by Kumar, Sunil, Ratnoo, Saroj, Vashishtha, Jyoti

    Published 2021
    “…Finding optimal values for the hyper parameters of a decision tree construction algorithm is a challenging issue. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Challenges of hidden data in the unused area two within executable files by Naji, Ahmed Wathik, Zaidan, A.A., Zaidan, B.B.

    Published 2009
    “…The designed algorithms were intended to help in proposed system aim to hide and retract information (data file) with in unused area 2 of any execution file(exe.file). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree by Rahim At Samsuddin, H. A., Ab. Rahman, A. A. H., Andaljayalakshmi, G., Ahmad, R. B.

    Published 2008
    “…Furthermore, the robustness of genetic algorithm also has been investigated in order to validate the performance stability in achieving the optimal solution for every runtime. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    ECG encryption enhancement with multi-layers of AES and DNA computing by Kh-Madhloom, Jamal

    Published 2023
    “…In order to more effectively incorporate both present technology and developing technology, models of DNA cryptography need to be developed. MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis