Search Results - (( basic based modeling algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- modeling algorithm »
- testing algorithm »
- java application »
- based modeling »
-
1
Mobile application for real time baby sign language recognition using YOLOv8 / Siti Aishah Idris and Ahmad Firdaus Ahmad Fadzil
Published 2024“…The model will be designed and developed using a deep learning algorithm, which is YOLOv8, the latest version of YOLO. …”
Get full text
Get full text
Get full text
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Group consumers' preference recommendation algorithm model for online apparel's colour based on Kansei engineering
Published 2023“…Thus, this study took the colour design of men's plain-colour shirts as an example in China, established the basic colour calculation scale and an algorithm model of group consumers' product preferences based on Kansei Engineering and scientific mathematics, to provide new sales ideas and methods for retailers and markets online. …”
Get full text
Get full text
Get full text
Article -
5
Agent-based extraction algorithm for computational problem solving
Published 2015“…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
Get full text
Get full text
Thesis -
6
-
7
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Voting algorithms for large scale fault-tolerant systems
Published 2011“…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
Get full text
Get full text
Thesis -
9
-
10
The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model
Published 2017“…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. Clustering technique basically utilizes distance measure to define distance between various data points. …”
Get full text
Get full text
Get full text
Article -
11
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
12
Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System
Published 2019Get full text
Get full text
Conference or Workshop Item -
13
-
14
-
15
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…This thesis proposes a Case-Based Reasoning model for medical diagnosis,particularly for Thalassaemia diagnosis. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Thalassaemia detection using CBR Algorithm via mobile device
Published 2011“…This thesis proposes a Case-Based Reasoning model for medical diagnosis,particularly for Thalassaemia diagnosis. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Development of computer aided three-dimensional geometric modeler based on designer's idea in twodimensional
Published 2006“…The methodology used in this study is based on the framework of a geometric modeler that contains two phases. …”
Get full text
Get full text
Monograph -
18
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…Basically, subspace identifications are based on algorithms from numerical algebras which are the QR decomposition and Singular Value Decomposition (SVD). …”
Get full text
Get full text
Get full text
Article -
19
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
20
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph
