Search Results - (( case detection method algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    DEVELOPMENT OF OE-BASED BROWN-FORSYTHE TEST ALGORITHM FOR CONTROL VALVE STICTION DETECTION by JOLENE DIANDRA, JAMES

    Published 2018
    “…Lastly, it is compared with other published stiction detection methods, where it performs as efficient and even better than other methods.…”
    Get full text
    Get full text
    Get full text
    Final Year Project Report / IMRAD
  3. 3
  4. 4

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  5. 5

    Test case generation from state machine with OCL constraints using search-based techniques / Aneesa Ali Ali Saeed by Aneesa Ali, Ali Saeed

    Published 2017
    “…The results were statically analyzed using t-test to show the significance of the proposed method compared to the existing methods. The results show that the proposed infeasible path detection method was efficient and detect 99 percent of the infeasible paths in the three industrial systems. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    An adept edge detection algorithm for human knee osteoarthritis images by Zahurul S., Zahidul S., Jidin R.

    Published 2023
    “…Also, it is shown that the algorithm is very effective in case of noisy and blurs images. � 2010 IEEE.…”
    Conference Paper
  7. 7

    The effect of replacement strategies of genetic algorithm in regression test case prioritization of selected test cases by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…This study presents an optimized regression test case prioritization of selected test cases for object-oriented software using Genetic algorithm with different replacement strategies. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Comparison between reverse and traditional screening algorithms for syphilis diagnosis in Hospital Universiti Sains Malaysia by Sidek, Nurul Azira

    Published 2021
    “…Following the reverse algorithm, 27 (13.11%) cases showed discordant ECLIA and RPR results. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Early detection and mitigation of DDoS attacks in software defined networks by Al-Saadi, Mustafa Yahya Zakariya

    Published 2018
    “…If the entropy of the destination JP address falls below the threshold and continue for five consecutive times it is declared as an attack. Then the algorithm was tested with attack on one host and a sub net of six hosts with attack rates of25%, 50% and 75% for the first case and 50%, 75% attack rate for the subnet case. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Soft robotic glove system controlled with amplitude independent muscle activity detection algorithm by using single sEMG channel by Hameed, Husamuldeen Khalid, Wan Hasan, Wan Zuha, Shafie, Suhaidi, Ahmad, Siti Anom, Jaafar, Haslina

    Published 2018
    “…The algorithm is also insensitive to the spurious background spikes that may contaminate the sEMG signal and deteriorate the performance of amplitude dependent detection methods. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Hybrid Artificial Bee Colony Algorithm for t-Way Interaction Test Suite Generation by Alazzawi, A.K., Rais, H.M., Basri, S.

    Published 2019
    “…The very large number of test cases and time consumption for a test, it is becoming hard to perform exhaustive testing for any software fault detection. …”
    Get full text
    Get full text
    Article
  13. 13

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…The results showed the effectiveness of the proposed method for detecting multiple clusters in a spatiotemporal space. …”
    Get full text
    Get full text
    Article
  14. 14

    An eigenspace approach for detecting multiple space-time disease clusters: Application to measles hotspots detection in khyber-pakhtunkhwa, Pakistan by Ullah, S., Daud, H., Dass, S.C., Hadi, F.-T., Khalil, A.

    Published 2018
    “…The results showed the effectiveness of the proposed method for detecting multiple clusters in a spatiotemporal space. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17
  18. 18

    Detection of micro emboli using signal energy and discrete fourier transform / Basil Mathew Panamkuttiyil by Basil Mathew , Panamkuttiyil

    Published 2011
    “…The designed algorithm was able to detect presence of emboli with considerable accuracy. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Integrated combined layer algorithm of jamming detection and classification in manet / Ahmad Yusri Dak by Dak, Ahmad Yusri

    Published 2019
    “…This creates the jamming detection and classification parameters. The second stage is detecting jammers by integrating both lower layers by developing Integrated Combined Layer Algorithm (ICLA). …”
    Get full text
    Get full text
    Thesis
  20. 20

    Detection of the spread of Covid-19 in Indonesia using K-Means Clustering Algorithm / Mohammad Yazdi Pusadan ... [et al.] by Pusadan, Mohammad Yazdi, Rabbani, Mohammad Abied, Ardiansyah, Rizka, Ngemba, Hajra Rasmita

    Published 2023
    “…The implementation of the K-Means Clustering algorithm for detecting the level of spread of COVID-19 data in Indonesia by using the parameter k=3 is quite good with areas in Indonesia that have a high the spread of COVID-19 and the results of the cluster validity test get silhouette values on O = (Total Case, Total Death) and P = (Total Case, Total Death, Total Recovered) have the same cluster value, which is 0.93 which means the cluster quality is very good.…”
    Get full text
    Get full text
    Book Section