Search Results - (( (variable OR variables) create process algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- process algorithm »
- testing algorithm »
- java application »
- create process »
-
1
Comparing seabed roughness result from QPS fledermaus software, benthic trrain modeler [BTM] and developed model derived FRM slope variability algorithm for hard coral reef detecti...
Published 2018“…In ArcGlS software, DEM data will be process by using terrain roughness model that has been derived by using Slope Variability algorithm. …”
Get full text
Get full text
Thesis -
2
To study the multi-objective optimization of EDM using genetic algorithm
Published 2013“…Development of EDM process has resulted in significant improvements in operating techniques, productivity and accuracy, which the result of this machining development has helped variability in EDM process. …”
Get full text
Get full text
Undergraduates Project Papers -
3
Message based random variable length key encryption algorithm.
Published 2009“…None fixed size key caused avoidance of replaying and other attacks that can happen on fixed sized key algorithms. Conclusion: Random process employed in this block cipher increased confidentiality of the message and dynamic length substitution in proposed algorithm may lead to maximum cryptographic confusion and consequently makes it difficult for cryptanalysis.…”
Get full text
Get full text
Article -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Neutralisation state driven single-agent search strategy for solving constraint satisfaction problem / Saajid Akram Ahmed Abuluaih
Published 2019“…For example, the framework of solving CSP imposes a complete permutation of assignments to all remaining variables in order to derive a valid model. The author argues in this study that the problem can be neutralised and it is not necessary to perform brute-force searching all the time if a search strategy could have guided the process to the level where the values of the remaining variables can be determined implicitly, creating what the author calls Solo-Path of assignments in the problem search tree.…”
Get full text
Get full text
Thesis -
6
Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat
Published 2021“…Inspired by some of the generative art made via programming, I was able to create my own algorithmic concept, using these “noises” as factors or variables to affect the creation of the proposed visual. …”
Get full text
Get full text
Book Section -
7
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
8
Flame Development Study at Variable Swirl Level Flows in a Stratified CNG DI Combustion Engine using Image Processing Technique
Published 2011Get full text
Get full text
Citation Index Journal -
9
The Determinant Factors for the Issuance of Central Bank Digital Currency (CBDC) in Malaysia using Machine Learning Framework
Published 2024“…The overall CentralBank Digital Currency Project Index (CBDCPI) was selected as a target variable,while two machine learning algorithms, Random Forest and XGBoost were utilized to identify the determining variables. …”
Get full text
Get full text
Get full text
Article -
10
The determinant factors for the issuance of Central Bank Digital Currency (CBDC) in Malaysia using machine learning framework
Published 2024“…The overall Central Bank Digital Currency Project Index (CBDCPI) was selected as a target variable, while two machine learning algorithms, Random Forest and XGBoost were utilized to identify the determining variables. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
-
12
-
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Edge detection and contour segmentation for fruit classification in natural environment / Khairul Adilah Ahmad
Published 2018“…Due to the inherent and uncertain variability of the Harumanis features, fuzzy learning algorithm has been designed to classify these fruits similar to the ability of human experts. …”
Get full text
Get full text
Thesis -
15
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
16
Detection of Denial of Service Attacks against Domain Name System Using Neural Networks
Published 2009“…The pre-processor, processes the collected data statistically and derives the final variable values. …”
Get full text
Get full text
Thesis -
17
Modelling of cupping suction system based on system identification method
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
An application of predicting student performance using kernel k-means and smooth support vector machine
Published 2012“…These techniques successfullyapplied in processing large amounts of data, especially on high dimensional data that are nonlinearly separable. …”
Get full text
Get full text
Thesis -
19
-
20
