Search Results - (( java data normalization algorithm ) OR ( construct validation approach algorithm ))
Search alternatives:
- normalization algorithm »
- construct validation »
- validation approach »
- data normalization »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Even a normal people using clustering to grouping their data. …”
Get full text
Get full text
Thesis -
2
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
3
A multi-depot vehicle routing problem with stochastic road capacity and reduced two-stage stochastic integer linear programming models for rollout algorithm
Published 2021“…The proposed approach is suitable for obtaining a policy constructed dynamically on the go during the rollout algorithm. …”
Get full text
Get full text
Article -
4
Hyper-Heuristic Evolutionary Approach for Constructing Decision Tree Classifiers
Published 2021“…The proposed approach is validated on 30 datasets. It is statistically proved that HEARpart performs significantly better than WEKA's J48 algorithm in terms of error rate, F-measure, and tree size. …”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
-
7
Landslide susceptibility mapping at VAZ watershed (Iran) using an artificial neural network model: a comparison between multilayer perceptron (MLP) and radial basic function (RBF)...
Published 2013“…Finally the landslide susceptibility maps were validated using the validation data (i.e., 30 % landslide location data that was not used during the model construction) using area under the curve (AUC) method. …”
Get full text
Get full text
Article -
8
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2008“…Furthermore, the robustness of genetic algorithm also has been investigated in order to validate the performance stability in achieving the optimal solution for every runtime. …”
Get full text
Get full text
Conference or Workshop Item -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
10
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2009Get full text
Working Paper -
11
A self-adaptive agent-based simulation modelling framework for dynamic processes
Published 2023“…Key parameters for dynamic processes of different domains were formulated for the construction of self-adaptive simulation algorithms and modelling. …”
text::Thesis -
12
An automated approach to elicit and validate security requirements of mobile application
Published 2018“…Mobile phone usage has continued to rise,and it is becoming more convenient for users to use mobile applications for booking hotels,conducting online transaction and online payment.In this case,secured applications are required to increase the confidence among mobile users.In order to achieve correct secure application,a correct security requirements needs to be elicited and defined.Additionally,it is also crucial for security requirements of mobile apps to fulfill basic quality attributes such as correct,consistent and complete (3Cs).However,few problems are found in eliciting security requirements for mobile apps.Firstly, most requirements engineers (RE) are identified to have less knowledge and understanding of security requirements attributes,leading to the failure of implementing the 3Cs of security requirements.Secondly,most of the elicitation and the validation of security requirements are conducted at the later stage of the development and leads to poor quality security requirements implementation which might resulted to project failure.Motivated from these problems,the objectives of this thesis are three-folds; 1) To analyze the security requirements for mobile apps, 2) To propose an approach to elicit and end-to-end validation of security requirement,and 3)To evaluate the efficacy in term of correctness and performance as well as usability of the approach.This thesis proposes a new automated approach to assist the elicitation and validation of security requirements.Here an automated tool support called MobiMEReq is also developed.For this, we have adopted Test Driven Development (TDD) methodology with semi-formalized models:i) Essential Use Cases (EUCs) and ii) Essential User Interface (EUI).We then divided our approach into two parts:1)Elicitation and 2)End-to-end validation security requirements.Further,we have developed pattern libraries to assist on the correct elicitation and validation.They are mobile Security attributes pattern library and mobile security pattern library.Then,we have constructed a new algorithm using fuzzy logic to assist on the prioritization of the test for better performance of validation.Finally,a comprehensive evaluation of the approach,comprising experiments of correctness test and usability test were conducted.Here,we have also evaluated the feedback from the industry experts especially on the usability of the automated approach and tool support.In summary,the findings of the evaluations show that our approach is able to contribute to the body of knowledge of mobile security requirements engineering especially in enhancing the performance and correctness level of security attribute elicitation and its usability for end-to-end elicitation and validation.It is found that the approach able to enhance the correctness level of the elicited security attribute compared to the manual approach,and produce correct generation of test.Then,the results of the usability test by the novice and experts show that the approach is useful in eliciting and validating security requirements at the early stage of application development and is able to ease the elicitation and validation process of security requirements of mobile apps.…”
Get full text
Get full text
Get full text
Thesis -
13
-
14
Theory-guided machine learning for predicting and minimising surface settlement caused by the excavation of twin tunnels / Chia Yu Huat
Published 2024“…Shield machines, like earth pressure balance and slurry machines, are pivotal in modern tunnel construction. However, twin tunnel construction in urban areas commonly faces surface settlement (SS) issues, which threaten nearby structures. …”
Get full text
Get full text
Get full text
Thesis -
15
Harmony Search Approach In The Strut And Tie Model To Optimise The Stress Distribution In A Concrete Box Girder
Published 2021Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Effective use of artificial intelligence by Malaysian manufacturing firms to enable sustainability 4.0
Published 2023“…In this project, Fornell-Larker parameters are used to test the measurement algorithm for the research's discriminant validity. 380 valid questionnaires returnedback and conducted the calculation of the algorithm's assessment to constructs' validity and realibility assessment, discriminant validity using HTMTand Fornell-Larker approaches. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
17
Development of a Negotiation Support Model for Value Management in Construction
Published 2009“…The methodology is based on a theoretical approach which consists of value-based decision nature in construction VM, multicriteria group decision making, game theory, negotiation theory, and agent-based development. …”
Get full text
Get full text
Final Year Project -
18
Effective gene selection techniques for classification of gene expression data
Published 2005“…Support Vector Machine (SVM) and k-nearest neighbour (knn) are used for the classification purposes. The proposed approach is validated using leave one out cross validation (LOOCV). …”
Get full text
Get full text
Thesis -
19
A new protocol of dual deniability encryption techniques based on asymmetric secret sharing method / Mohsen Mohamad Hata
Published 2019“…Secured communication is achieved where the notion of plausible deniability is successfully implemented by fusing the processes of theorem's verification and data's validation in the protocol construction methodology.…”
Get full text
Get full text
Thesis -
20
ECG encryption enhancement with multi-layers of AES and DNA computing
Published 2023“…MATLAB 2017b, a reliable simulation method, was utilised throughout the construction and validation of the algorithm. The performance of the recommended approach makes it possible to thwart an attack using brute force considerably more fast than is possible with the encryption technologies that are currently in use. …”
Get full text
Get full text
Get full text
Thesis
