Search Results - (( basic computer valued algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    CSC126 - Fundamentals of Algorithms and Computer Problem Solving / Faculty of Computer And Mathematical Sciences by UiTM, Faculty of Computer And Mathematical Sciences

    Published 2023
    “…Students will be taught to solve problems involving the 5 basic algorithms of summation, average, counting, as well as determining the minimum and maximum values of a set of data. …”
    Get full text
    Get full text
    Get full text
    Teaching Resource
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4

    Hexagon pattern particle swarm optimization based block matching algorithm for motion estimation / Siti Eshah Che Osman by Che Osman, Siti Eshah

    Published 2019
    “…Zero Motion Prejudgment is implemented as an additional approach to speed up the searching process hence could reduce computation performance. The final results have proved that HPSO algorithm could achieve 5% - 34% of computation cost reduction with satisfying degradation value of image quality. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Voting algorithms for large scale fault-tolerant systems by Karimi, Abbas

    Published 2011
    “…Using a proper test-bed, after 10000 run times, we compared our newly proposed algorithm with the basic algorithm in terms of reliability and availability. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…However, because of the SVD computational complexity that involved in the algorithm, the classical SMI algorithms are not suitable for online application. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Interval-valued fuzzy soft topology and its applications in group decision-making problems by Altwer, Mabruka Ali Juma

    Published 2022
    “…In the application phase of this thesis, we provide a representation of the results acquired in the previous steps in order to compute and define various algorithms that assist group decision-making using interval-valued fuzzy soft sets. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive circular enclosure colour distribution geometrical model utilizing point-in-polygon for segregation between lips and skin pixels by Lee, Hao Wei, Seng, Kah Phooi *, Chia, Wai Chong *, Ang, Li-Minn

    Published 2012
    “…Using LAB colour-space, lips colours were compiled into a colour-map and processed accordingly to our proposed algorithm of adaptive circular enclosure. Algorithm output was determined as a series of coordinates symbolizing boundary values surrounding colourmap. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Derivations and centroids of finite dimensional dialgebras by Mohamed, Mohamed Abubakar Hagi

    Published 2016
    “…In all the cases, we give an algorithm to find the derivation algebras. The algorithm is applied to compute the derivations of low dimensional diassociative algebras. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  20. 20