Search Results - (( java data normalization algorithm ) OR ( construct validity designing algorithm ))
Search alternatives:
- normalization algorithm »
- designing algorithm »
- data normalization »
- construct validity »
- java »
-
1
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
2
Design and analysis of construction and recombination module using Idury Waterman Algorithm for fragment assembly application / Hafifi Mohd Rafi
Published 2012“…The result of the proposed algorithm, verifies the validity of proposed algorithm.…”
Get full text
Get full text
Thesis -
3
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
4
Strategies for effective value management practice in construction industry
Published 2017“…The investigated VM methods involved conducting building value analysis in the design stage. To demonstrate the validity and efficiency of the proposed optimisation algorithm, various case studies were conducted in Malaysia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
The Construction Of Quantum Block Cipher For Grover Algorithm
Published 2018Get full text
Get full text
Thesis -
6
Improved dung beetle optimization algorithm and finite element analysis for spindle optimization
Published 2024“…Modal analysis up to the sixth order validates the design correctness reveals dynamic spindle behavior and guarantees the design requirements. …”
Get full text
Get full text
Get full text
Article -
7
-
8
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Electing the best set of features will help to improve the classifier predictions in terms of the normal and abnormal pattern. The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
9
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The steps are problem definition, construct the simulation model, test and validate the model, design the simulation experiments, conduct the simulation experiments, evaluate the result and implement the result. …”
Get full text
Get full text
Get full text
Thesis -
10
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
11
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…The proposed design guidelines were validated through expert reviews, which involved 16 experts. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2008“…A binary tree method for non-slicing tree construction process is utilized for the placement and area optimization of macro-cell layout in very large scaled integrated (VLSI) design. …”
Get full text
Get full text
Conference or Workshop Item -
13
-
14
Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun
Published 2016“…The project produces a numbers of prototypes, Software Requirement Specification (SRS) and System Design Document (SDD). The developed CTMS has been demonstrated to the eSM and has gone through an evaluation and validation.…”
Get full text
Get full text
Thesis -
15
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…The Lecturer profile contains information of lecturer teaching load, research, publication and many more. We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
Get full text
Get full text
Get full text
Article -
16
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
17
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2009Get full text
Working Paper -
18
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The algorithms are successfully designed using the Altera Quartus II platform. …”
Get full text
Get full text
Get full text
Proceeding -
19
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…Somehow, the substitution box (s-box) in the AES block cipher is fixed or static for all rounds and has become the target of many attacks. The design of the s-box is the most crucial part while designing a new block cipher algorithm since it is the only non-linear element of the cipher. …”
Get full text
Get full text
Thesis -
20
Development of a Negotiation Support Model for Value Management in Construction
Published 2009“…The negotiation support bridges theoretical gap between automated design in construction domain and automated negotiation in information technology domain by providing a structured methodology which can lead to systematic support system and automated negotiation for VM process. …”
Get full text
Get full text
Final Year Project
