Search Results - (( based computer data algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- based computer »
- data algorithm »
- computer data »
-
1
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006“…Computer B will send the data to the BASIC Stamp and the BASIC Stamp will check their program. …”
Get full text
Get full text
Monograph -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
3
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
4
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin
Published 2012“…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
Get full text
Get full text
Thesis -
6
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
-
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
9
LCSS-Based Algorithm for Computing Multivariate Data Set Similarity: A Case Study of Real-Time WSN Data
Published 2019“…The proposed algorithm performs exceptionally well on numerous multivariate data sets compared with the classical dynamic programming-based algorithms. …”
Get full text
Get full text
Article -
10
-
11
Data discovery algorithm for scientific data grid environment
Published 2005“…The algorithms we studied are based on the P2P architecture. …”
Get full text
Get full text
Get full text
Article -
12
Workflow optimization in distributed computing environment for stream-based data processing model / Saima Gulzar Ahmad
Published 2017“…This thesis proposes data-intensive workflow optimization algorithms. …”
Get full text
Get full text
Get full text
Thesis -
13
Image Encrytion Using Block Based Transformation Algorithm
Published 2008Get full text
Get full text
Get full text
Article -
14
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
15
-
16
-
17
-
18
-
19
Data in transit validation for cloud computing using cloud-based algorithm detection of injected objects
Published 2018“…Hence, a validation protocol algorithm based on hash function labelling provides a one-time security header for transferable files that protects data in transit against any unauthorized injection. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
MuDi-Stream: A multi density clustering algorithm for evolving data stream
Published 2016Get full text
Get full text
Article
