Search Results - (( basic computer valued algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- valued algorithm »
- java application »
- computer valued »
- basic computer »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences
Published 2023“…Students will be taught to solve problems involving the 5 basic algorithms of summation, average, counting, as well as determining the minimum and maximum values of a set of data. …”
Get full text
Get full text
Get full text
Teaching Resource -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman
Published 2019“…Zero Motion Prejudgment is implemented as an additional approach to speed up the searching process hence could reduce computation performance. The final results have proved that HPSO algorithm could achieve 5% - 34% of computation cost reduction with satisfying degradation value of image quality. …”
Get full text
Get full text
Thesis -
5
Voting algorithms for large scale fault-tolerant systems
Published 2011“…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
Get full text
Get full text
Thesis -
6
T-way testing : a test case generator based on melody search algorithm
Published 2015Get full text
Get full text
Undergraduates Project Papers -
7
Recursive Subspace Identification Algorithm Using The Propagator Based Method
Published 2017“…However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. …”
Get full text
Get full text
Get full text
Article -
8
-
9
-
10
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Interval-valued fuzzy soft topology and its applications in group decision-making problems
Published 2022“…In the application phase of this thesis, we provide a representation of the results acquired in the previous steps in order to compute and define various algorithms that assist group decision-making using interval-valued fuzzy soft sets. …”
Get full text
Get full text
Thesis -
12
Adaptive circular enclosure colour distribution geometrical model utilizing point-in-polygon for segregation between lips and skin pixels
Published 2012“…Using LAB colour-space, lips colours were compiled into a colour-map and processed accordingly to our proposed algorithm of adaptive circular enclosure. Algorithm output was determined as a series of coordinates symbolizing boundary values surrounding colourmap. …”
Get full text
Get full text
Conference or Workshop Item -
13
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
-
17
Knowledge-based genetic algorithm for multidimensional data clustering
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
18
Derivations and centroids of finite dimensional dialgebras
Published 2016“…In all the cases, we give an algorithm to find the derivation algebras. The algorithm is applied to compute the derivations of low dimensional diassociative algebras. …”
Get full text
Get full text
Get full text
Thesis -
19
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
20
Indoor Location Sensing Using WLAN IEEE 802.11b
Published 2008Get full text
Get full text
Conference or Workshop Item
