Search Results - (( basic detection _ algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  3. 3
  4. 4
  5. 5

    A Collision Detection Algorithm For Virtual Robot-Centered Flexible Manufacturing Cell by Arshad, Haslina

    Published 2008
    “…The technique utilizes the narrow phase approach in detecting collision detection of non-convex object by testing collision between basic primitive and polygon. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7

    Model of Improved a Kernel Fast Learning Network Based on Intrusion Detection System by Ali, Mohammed Hasan, Mohamed Fadli, Zolkipli

    Published 2019
    “…The approach was tested on the KDD Cup99 intrusion detection dataset and the results proved the proposed PSO-RKFLN as an accurate, reliable, and effective classification algorithm.…”
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11
  12. 12

    A detector generating algorithm for intrusion detection inspired by artificial immune system by Alsharafi, Walid Mohamed, Omar, Mohd Nizam

    Published 2015
    “…Artificial immune system (AIS) allows us to inspire several ideas for the design of computer intrusion detection.The standard of negative selection algorithm (NSA), offered by Stephanie Forrest in 1994, is one of the most common mechanisms in AIS that applied in anomaly detection for the similarity of its basic idea. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Boundary extraction and corner point detection for map of kariah Kg. Bukit Kapar / 'Afina AmirHussin by AmirHussin, 'Afina

    Published 2019
    “…Boundary extraction and corner point detection are basic step for many image processing applications including image enhancement, object detection and pattern recognition. …”
    Get full text
    Get full text
    Thesis
  14. 14

    The effect of different distance measures in detecting outliers using clustering-based algorithm for circular regression model by Nur Faraidah, Muhammad Di, Siti Zanariah, Satari

    Published 2017
    “…In this study, we proposed multiple outliers detection in circular regression models based on the clustering algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  16. 16
  17. 17

    Distance approximation using pivot point in narrow phase collision detection by Sulaiman, Hamzah Asyrani, Bade, Abdullah, Abdullah, Mohd Harun

    Published 2013
    “…Thus, an algorithm for the optimal distance computation algorithm for continuous collision detection is shown in this paper. …”
    Get full text
    Get full text
    Conference or Workshop Item
  18. 18

    Shot boundary detection based on orthogonal polynomial by Abdulhussain, Sadiq H., Ramli, Abd Rahman, Mahmmod, Basheera M., Saripan, Mohd Iqbal, Al-Haddad, Syed Abdul Rahman, Jassim, Wissam A.

    Published 2019
    “…SBD is the process of automatically partitioning video into its basic units, known as shots, through detecting transitions between shots. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20