Search Results - (( based generating new algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Design and development of an intuitive desktop application for rapid SARS-CoV-2 diagnosis using electrochemical potentiostat by Assaig, Faisal Ahmed, Gunawan, Teddy Surya, Nordin, Anis Nurashikin, Ab Rahim, Rosminazuin, Mohd Zain, Zainiharyati

    Published 2023
    “…Our primary focus revolved around creating a user-friendly desktop application, seamlessly integrating an algorithm that automates result generation for operators. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4

    Enhance key generation algorithm based user string identity as public key by Norhidayah, Muhammad

    Published 2015
    “…This study aims to enhance a previous algorithm called the Tripathi algorithm. The Tripathi algorithm proposes an RSA based approach to generate cryptographic keys using a user’s identity, such as an E-mail address. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Sequence and sequence-less t-way test suite generation strategy based on the elitist flower pollination algorithm by Mohammed Abdullah, Abdullah Nasser

    Published 2018
    “…If t-way strategies are to be adopted in such a system, there is also a need to support test data generation based on sequence of interactions. Addressing these aforementioned issues and complementing the existing sequence based strategies such as t-SEQ, Sequence Covering Array Generator and Bee Algorithm, this thesis presents a unified strategy based on the new meta-heuristic algorithm, called the Elitist Flower Pollination Algorithm (eFPA). …”
    Get full text
    Get full text
    Thesis
  6. 6

    Multiple case-based retrieval for university course timetabling problem by Hong, Siaw Theng

    Published 2016
    “…The case-based retrieval technique is further enhanced and improvised into a new algorithm known as Multiple Case-based Retrieval. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Designing new chaotic and hyperchaotic systems for chaos-based cryptography by Kadhim, Al Karawi Hayder Natiq

    Published 2019
    “…To investigate its performance in terms of security, a new chaos-based image encryption algorithm is also proposed. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Starter Set Generation Based on Factorial Numbers for Half Wing of Butterfly Representation by Karim, Sharmila, Ibrahim, Haslinda

    Published 2021
    “…This new algorithm is still in the early stage and under development for the generation of the half wing of butterfly representation. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    A block cipher based on genetic algorithm by Zakaria, Nur Hafiza

    Published 2016
    “…In this research, we proposed a new block cipher algorithm based on genetic algorithm approach which shall meet the security requirements. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Opposition-based Whale Optimization Algorithm by Alamri, Hammoudeh S., Alsariera, Yazan A., Kamal Z., Zamli

    Published 2018
    “…In order to improve solution accuracy and reliability, this paper proposes a new algorithm based on WOA. The new algorithm called Opposition-based Whale Optimization (OWOA). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    A fuzzy adaptive teaching learning-based optimization strategy for generating mixed strength t-way test suites by Din, Fakhrud

    Published 2019
    “…Many test data generation strategies based on meta-heuristic algorithms such as Simulated Annealing (SA), Tabu Search (TS), Genetic Algorithm (GA), Ant Colony Optimization (ACO), Particle Swarm Optimization (PSO), Harmony Search (HS), Cuckoo Search (CS), Bat Algorithm (BA) and Bees Algorithm have been developed in recent years. …”
    Get full text
    Get full text
    Thesis
  12. 12

    A hybrid kidney algorithm strategy for combinatorial interaction testing problem by Ameen Ali, Mohammed Ba Homaid

    Published 2022
    “…HKAS is the first hybrid metaheuristic-based CIT strategy that generates an optimum FTS size with less execution time than the original algorithm-based CIT strategy. …”
    Get full text
    Get full text
    Thesis
  13. 13

    NIS-Apriori-based rule generation with three-way decisions and its application system in SQL by Sakai, H., Nakata, M., Watada, J.

    Published 2020
    “…Subsequently, the implementation of the NIS-Apriori algorithm in SQL is described and a few new topics induced by effects of NIS-Apriori-based rule generation are confirmed. …”
    Get full text
    Get full text
    Article
  14. 14

    An upgrade on the key generation algorithm of the GGH-MKA lattice-based encryption scheme by Arif, Mandangan, Kamarulhaili, Hailiza, Asbullah, Muhammad Asyraf

    Published 2021
    “…In the key generation algorithm of the GGH cryptosystem, the good and bad features of the lattice bases are measured by computing orthogonality-defect value. …”
    Get full text
    Get full text
    Article
  15. 15

    Combinatorial test suites generation strategy utilizing the whale optimization algorithm by Ali Abdullah, Hassan, Salwani, Abdullah, Kamal Zuhairi, Zamli, Rozilawati, Razali

    Published 2020
    “…Supporting the No Free Lunch theorem, as well as potentially offering new insights into the whole process of t-way generation, this article proposes a new strategy with constraint support based on the Whale Optimization Algorithm (WOA). …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The specific aims in employing DEAM-based SPCS are to investigate a strategy to resolve the line overloading issue through the N-1 contingency based on the load flow analysis and the severity index develop SPCS scheme through the generation rescheduling strategy based on the hybrid DEAM algorithm. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Optimizing S-box generation based on the Adaptive Agent Heroes and Cowards Algorithm by Kamal Z., Zamli

    Published 2021
    “…This paper introduces a new variant of a metaheuristic algorithm based on Agent Heroes and Cowards Algorithm (AHC), called Adaptive Agent Heroes and Cowards Algorithm (AAHC). …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    An Upgrade on the Key Generation Algorithm of the GGH-MKA Lattice-Based Encryption Scheme by Arif Mandangan, Kamarulhaili, H., Asbullah, M. A.

    Published 2021
    “…In the key generation algorithm of the GGH cryptosystem, the good and bad features of the lattice bases are measured by computing orthogonality-defect value. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    The normalized random map of gradient for generating multifocus image fusion by Ismail, ., Kamarul Hawari, Ghazali

    Published 2020
    “…Furthermore, they get difficulties to create the new one. In order to handle this problem, the proposed method a concise algorithm which is able to generate an accurate fused image without using a complicated mathematical equation and tough algorithm. …”
    Get full text
    Get full text
    Get full text
    Article