Search Results - (( based testing linear algorithm ) OR ( java application based algorithm ))
Search alternatives:
- application based »
- linear algorithm »
- java application »
- testing linear »
- based testing »
-
1
Application-Programming Interface (API) for Song Recognition Systems
Published 2024“…An approach capable of recognizing an audio piece of music with an accuracy equal to 90% was further tested based on this result. In addition the implementation is done by algorithm using Java’s programming language, executed through an application developed in the Android operating system. …”
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Dynamic determinant matrix-based block cipher algorithm
Published 2018“…The output from the DDBC algorithm will be tested and validated through NIST Statistical Test Suite. …”
Get full text
Get full text
Thesis -
4
Performance comparison of linear and non-linear great deluge algorithms in solving university course timetabling problems
Published 2017“…The GD algorithm is tested over three benchmark datasets: testing dataset; semester 2 session 2014/2015 test set; semester 1 session 2015/2016 test set. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. …”
Get full text
Get full text
Article -
7
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. …”
Get full text
Get full text
Article -
8
Model structure selection for a discrete-time non-linear system using genetic algorithm
Published 2004“…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. …”
Get full text
Get full text
Get full text
Article -
9
Non-invasive pathological voice classifications using linear and non-linear classifiers
Published 2010“…Linear classifier namely LDA based classifier and non-linear classifiers such as k-NN classifier, MLP network, PNN, and GRNN are suggested to discriminate pathological voices from normal voices. …”
Get full text
Thesis -
10
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
11
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
12
Model structure selection for a discrete-time non-linear system using a genetic algorithm
Published 2004“…The adequacy of the developed models is tested using one-step-ahead prediction and correlation-based model validation tests. …”
Get full text
Get full text
Article -
13
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
14
-
15
-
16
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
AI recommendation penetration testing tool for SQL injection: linear regression
Published 2025“…In conclusion, the objective of this project is success because the linear regression algorithm was able to be insert in the penetration testing framework.…”
Get full text
Get full text
Get full text
Article -
18
Comparison analysis of stream cipher algorithms for digital communication
Published 2007“…The best algorithm is the one that exceeds all of the tests.…”
Get full text
Get full text
Get full text
Article -
19
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
20
Linear optimization method by using a new iterative algorithm for available transfer capability (ATC)
Published 2009“…Most studies involved load flow based and contingencies that often can be performed in reasonable time with the use of linear methods. …”
Get full text
Get full text
Get full text
Article
