Search Results - (( java data virtualization algorithm ) OR ( construct validity designing algorithm ))
Search alternatives:
- virtualization algorithm »
- data virtualization »
- designing algorithm »
- construct validity »
- java »
-
1
Design and analysis of construction and recombination module using Idury Waterman Algorithm for fragment assembly application / Hafifi Mohd Rafi
Published 2012“…The result of the proposed algorithm, verifies the validity of proposed algorithm.…”
Get full text
Get full text
Thesis -
2
Strategies for effective value management practice in construction industry
Published 2017“…The investigated VM methods involved conducting building value analysis in the design stage. To demonstrate the validity and efficiency of the proposed optimisation algorithm, various case studies were conducted in Malaysia. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
The Construction Of Quantum Block Cipher For Grover Algorithm
Published 2018Get full text
Get full text
Thesis -
4
Improved dung beetle optimization algorithm and finite element analysis for spindle optimization
Published 2024“…Modal analysis up to the sixth order validates the design correctness reveals dynamic spindle behavior and guarantees the design requirements. …”
Get full text
Get full text
Get full text
Article -
5
-
6
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The steps are problem definition, construct the simulation model, test and validate the model, design the simulation experiments, conduct the simulation experiments, evaluate the result and implement the result. …”
Get full text
Get full text
Get full text
Thesis -
7
Key schedule algorithm based on coordinate geometry of a three-dimensional hybrid cube
Published 2019“…Therefore, it can be concluded that the strength and validity of KSAHC algorithm have been enhanced as compared to other algorithms and can serve as the alternative algorithm in designing security systems.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
User interface and interactivity design guidelines of algorithm visualization on mobile platform
Published 2019“…The proposed design guidelines were validated through expert reviews, which involved 16 experts. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…This methodology consist of Requirement and Planning, Design, Construction, Testing and Implementation. …”
Get full text
Get full text
Thesis -
10
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2008“…A binary tree method for non-slicing tree construction process is utilized for the placement and area optimization of macro-cell layout in very large scaled integrated (VLSI) design. …”
Get full text
Get full text
Conference or Workshop Item -
12
-
13
Automated tournament management system with dynamic matchmaking using genetic algorithm / Wan Muhammad Aqil Wan Harun
Published 2016“…The project produces a numbers of prototypes, Software Requirement Specification (SRS) and System Design Document (SDD). The developed CTMS has been demonstrated to the eSM and has gone through an evaluation and validation.…”
Get full text
Get full text
Thesis -
14
Using algorithmic taxonomy to evaluate lecturer workload
Published 2006“…The Lecturer profile contains information of lecturer teaching load, research, publication and many more. We constructed an algorithmic taxonomy based on the lecturer profile data to measure lecturer teaching workload. …”
Get full text
Get full text
Get full text
Article -
15
Hybrid weight deep belief network algorithm for anomaly-based intrusion detection system
Published 2022“…In this study, the Deep Belief Network algorithm was optimized and constructed to design an effective NIDS anomaly model. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
16
A genetic algorithm approach to VLSI macro cell non-slicing floorplans using binary tree
Published 2009Get full text
Working Paper -
17
Simulation-Based Power Estimation for High Throughput SHA-256 Design on Unfolding Transformation
Published 2022“…The algorithms are successfully designed using the Altera Quartus II platform. …”
Get full text
Get full text
Get full text
Proceeding -
18
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…Somehow, the substitution box (s-box) in the AES block cipher is fixed or static for all rounds and has become the target of many attacks. The design of the s-box is the most crucial part while designing a new block cipher algorithm since it is the only non-linear element of the cipher. …”
Get full text
Get full text
Thesis -
19
Development of a Negotiation Support Model for Value Management in Construction
Published 2009“…The negotiation support bridges theoretical gap between automated design in construction domain and automated negotiation in information technology domain by providing a structured methodology which can lead to systematic support system and automated negotiation for VM process. …”
Get full text
Get full text
Final Year Project -
20
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006“…The Lecturer profile contains information lecturer teaching, research, publication and many more. We constructed an algorithmic taxonomy based at the lecturer profile data to measure lecturer teaching workload. …”
Get full text
Get full text
Conference or Workshop Item
