Search Results - (( changes identification learning algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  3. 3

    Automated transtibial prosthesis alignment: A systematic review by Khamis T., Khamis A.A., Al Kouzbary M., Al Kouzbary H., Mokayed H., Razak N.A.A., Osman N.A.A.

    Published 2025
    “…The selected studies represent cutting-edge research, employing diverse approaches such as advanced machine learning algorithms and innovative alignment tools, to automate the detection and adjustment of prosthesis alignment. …”
    Review
  4. 4

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…Furthermore, feature extraction methods based on global features such as shape, color and texture do not lead to accurate identification since they cannot adapt to changing environment. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Another problematic aspect is related to the intrusion detection solutions that are based on machine learning cluster algorithms to learn systems’ specifications and extract general state-based rules for attacks identification. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei by Chen , Shilei

    Published 2021
    “…By integrating ISMA, both supervised and unsupervised machine learning algorithms were investigated to develop real-time damage identification schemes. …”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Hybrid signal processing and machine learning algorithm for adaptive fault classification of wind farm integrated transmision line protection by Olufemi, Osaji Emmanuel, Othman, Mohammad Lutfi, Hizam, Hashim, Othman, Muhammad Murtadha, Ammar, Aker Elhadi Emhemed Alhaaj, Okeke, Chidiebere Akachukwu, Onuabuchi, Nwagbara Samuel

    Published 2019
    “…The supervised machine learning algorithm from Bayesian network classified 99.15 % faults correctly with the operation time of 0.01 s to produced best-generalized model with an RMS error value of 0.05 for single line-to-ground (SLG) fault identification and classification. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  17. 17
  18. 18

    Study on crack detection using image processing techniques and deep learning – a survey by Saleem, Muhammad Asif, Senan, Norhalina, Ahmad, Rehan

    Published 2020
    “…So it very well may be done consequently by utilizing image processing. Deep learning algorithms have been used for the solution of multiple issues in the area of image classification. …”
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    Design and implementation of a real-time adaptive learning algorithm controller for a 3-DOF parallel manipulator / Mustafa Jabbar Hayawi by Hayawi, Mustafa Jabbar

    Published 2015
    “…It was found from experimentation that the ALAC was able to improve the position control of the parallel manipulator and adjusted the weights according to changing condition and control the system without any changes in the controlling algorithm. …”
    Get full text
    Get full text
    Thesis