Search Results - (( data integration generation algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- generation algorithm »
- application testing »
- testing algorithm »
- data integration »
- java application »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Energy Management in Integrated Microgrids: An Optimal Schedule Controller Utilizing Gradient Descent Algorithm
Published 2024“…Weather data, including wind, solar, fuel, and battery status, is integrated into the BGD algorithm for optimizing ON and OFF schedules. …”
Conference Paper -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
-
7
Load and service adaptive algorithm (LSAA) for tight coupling based integration architecture
Published 2014“…In order to fulfill the anywhere at any time data services demand, integration of existing wireless networks has attained the tremendous attention in last decades. …”
Get full text
Get full text
Conference or Workshop Item -
8
Facial features point localization using modified SIFT scale space / Zulfikri Paidi
Published 2020“…The purpose of this integration is because it is hoped that the Savitzky Golay filter can act as a high-preservation data generated by SIFT. …”
Get full text
Get full text
Thesis -
9
-
10
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State
Published 2022“…The second phase of the research work is to integrate the RES sites. TSP-GA algorithm is applied to generate the transmission line routing among the RES sites with minimum total distance. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
12
Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China
Published 2024“…Therefore, this study investigates the capability of various machine learning algorithms in predicting the power production of a reservoir located in China using data from 1979 to 2016. …”
Article -
13
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
14
-
15
Mobile technology generations and cryptographic algorithms: analysis study
Published 2016“…Therefore, some cryptographic algorithms have proposed as confidentiality and integrity algorithms in different mobile generations, in order to prevent or mitigate these harmful operations. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Ant lion optimizer for solving unit commitment with solar photovoltaic integration / Izni Nadhirah Sam’on
Published 2020“…This research is based on solving unit commitment problem with and without the integration of solar photovoltaic (PV). Data for IEEE 39-bus with 10-unit generators are used with the consideration of system constraints in unit commitment such as power balance, system reserve requirement, generation limit of generators, and minimum up and down time constraints. …”
Get full text
Get full text
Thesis -
18
A new variant of black hole algorithm based on multi population and levy flight for clustering problem
Published 2020“…The first modification is the integration of BH algorithm and levy flight, which result in data clustering method, namely “Levy Flight Black Hole (LBH)”. …”
Get full text
Get full text
Thesis -
19
Rtl Implementation Of Secure Hash Algorithm 3 (Sha-3) Towards Smaller Area
Published 2017“…Data integrity must be ensured before and after the data transmission. …”
Get full text
Get full text
Thesis -
20
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project
