Search Results - (( developing dynamic tree algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- developing dynamic »
- testing algorithm »
- java application »
- tree algorithm »
- dynamic tree »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
-
3
Treemap algorithm for dynamic stormwater infiltration movement into soil surface
Published 2015Get full text
Get full text
Conference or Workshop Item -
4
Dynamic scene occlusion culling in architectural scenes based on dynamic bounding volume
Published 2006“…An occlusion culling technique was developed for handling dynamic objects in static scenes using dynamic bounding volume. …”
Get full text
Get full text
Thesis -
5
Enhanced dynamic security assessment for power system under normal and fake tripping contingencies.
Published 2019“…The hybrid logistic model tree (hybrid LMT) approach proposed in this study combines the symmetrical uncertainties (SU) algorithm and the logistic model tree (LMT) algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
-
8
Polymorphic malware detection based on dynamic analysis and supervised machine learning / Nur Syuhada Selamat
Published 2021“…Extracting the behaviour of polymorphic malware is one of the major issues that affect the detection result.The main idea in this work is focus the behaviour(dynamic) of polymorphic malware infect in computer system and to extract feature selection and evaluate a limited set of dataset in order to improve detection of polymorphic malware.This study used dynamic analysis and machine learning to improve malware detection.This research demonstrated improved polymorphic malware detection can be achieved with machine learning.This research used four types of machine algorithm which are K-Nearest Neighbours, Decision Tree, Logistic Regression, and Random Forest. …”
Get full text
Get full text
Thesis -
9
Modeling of static and dynamic components of bio-nanorobotic systems
Published 2012“…In addition, a graph algorithm based on greedy methods is employed to compute a new set of optimal weighted electronic properties of the fullerenes via computing their Minimum Weight Spanning Trees (MWSTs). …”
Get full text
Get full text
Thesis -
10
Three dimension reconstruction of coronary artery tree using single-view cineangiogram
Published 2010“…Finally, we input the x, y and z of a specific coronary artery tree to the OPENGL library included in the software, which we developed and called Fast 3D (F3D) and which is displayed in R3. …”
Get full text
Get full text
Get full text
Article -
11
Sales prediction of religious product and services of Mutawwif Haramain Travel & Tours using predictive analytics
Published 2025“…Sales prediction in the religious services sector is challenging due to seasonal, cultural, and economic factors, which make traditional methods less reliable. This research develops a predictive model for sales prediction at Mutawwif Haramain Travel & Tours, utilizing machine learning algorithms, specifically Decision Tree, Random Forest, and Naive Bayes, to uncover patterns in customer behavior and seasonal demand. …”
Get full text
Get full text
Student Project -
12
-
13
A new approach to highway lane detection by using hough transform technique
Published 2017“…This paper presents the development of a road lane detection algorithm using image processing techniques.This algorithm is developed based on dynamic videos, which are recorded using on-board cameras installed in vehicles for Malaysian highway conditions.The recorded videos are dynamic scenes of the background and the foreground, in which the detection of the objects, presence on the road area such as vehicles and road signs are more challenging caused by interference from background elements such as buildings, trees, road dividers and other related elements or objects. …”
Get full text
Get full text
Get full text
Article -
14
Application of sampling-based motion planning algorithms in autonomous vehicle navigation
Published 2016“…One of the challenging research areas in autonomous vehicle is the development of an intelligent motion planner, which is able to guide the vehicle in dynamic changing environments. …”
Get full text
Get full text
Get full text
Book Section -
15
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Robotic path planning using rapidly-exploring random trees
Published 2013“…This study concerns the implementation of Rapidly-Exploring Random Trees (RRTs) algorithm for an autonomous robot path planning. …”
Get full text
Get full text
Get full text
Thesis -
17
Implication of image processing algorithm in remote sensing and GIS applications
Published 2011“…This review presents evaluation and utilization of different algorithms such as Simple Recursive Algorithm, Backtracking Algorithm, Divide and Conquer Algorithm, Dynamic Algorithm, Branch and Bound Algorithm, Brute Force Algorithm and Randomized Algorithm. …”
Get full text
Get full text
Get full text
Article -
18
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
19
-
20
