Search Results - (( developing formative testing algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- developing formative »
- testing algorithm »
- validation using »
- java validation »
- using algorithm »
-
1
An integrated algorithm of analytical network process with case-based reasoning to support the selection of an ideal football team formation and players
Published 2021“…In order to demonstrate the feasibility of the algorithm, the engine was tested in the real application of football team management. …”
Get full text
Get full text
Get full text
Thesis -
2
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
3
Interactive jigsaw puzzle using backtracking algorithm / Amizah Mohd Kamaruzaman
Published 2012“…The developed jigsaw puzzle was then tested to see the effectiveness ofthe Backtracking algorithm. …”
Get full text
Get full text
Thesis -
4
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
5
Auto-formation group chat for fitness application with rule-based / Amar Aslam Ramli
Published 2018“…Based on the testing result, it can be conclude that this project has successfully developed FitwithTrainer website and android mobile application system. …”
Get full text
Get full text
Student Project -
6
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
7
Framework for mining XML format business process log data
Published 2024“…Therefore, a lot of frequent subtree mining (FSM) algorithms and methods were developed to get information from semi-structured data specifically data with hierarchical nature. …”
Get full text
Get full text
Thesis -
8
Improvement and application of particle swarm optimization algorithm
Published 2025“…This method combines CPTD with the Genetic Algorithm and PSO (GAPSO), resulting in an effective strategy for dynamic formation reconfiguration and path optimization. …”
Get full text
Get full text
Article -
9
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
10
Feature-based stereo vision relative positioning strategy for formation control of unmanned aerial vehicles
Published 2019“…In addition, several different techniques and approaches for developing the algorithm is discussed as well. As per system requirements and conducted study, the algorithm that is developed for this Vision System is based on Tracking and On-Line Machine Learning approach. …”
Get full text
Get full text
Article -
11
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
12
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
13
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item -
14
Development of Malay word pronunciation application using vowel recognition
Published 2016“…In Malaysia, many researchers focus on developing speaker independent systems for training or articulation therapy or to assist language learners to learn about Malay Language or Bahasa Malaysia.Accuracy, noise robustness and processing time are concerns when developing speech therapy systems.In this study, a Malay word pronunciation test application was developed using the first 3 format and fundamental frequencies in an effort to improve pronunciation in Malay.This application was developed using Matlab and uses a vowel recognition algorithm classified using MLP classification technique.The application was developed and tested on UUM undergraduate students.For vowel classification, when fundamental frequency was added, 3-format feature vowel classification rate increased by 1.55% for male gender and 1.48% for female. …”
Get full text
Get full text
Get full text
Article -
15
Hybrid BLEU Algorithm For Structured Exam Management System
Published 2008“…Due to this problem, "Hybrid BLEU algorithm for Structured Exam Management System " is develop to aid the lecturers during assessment in the construction of quiz and test. …”
Get full text
Get full text
Get full text
Thesis -
16
Coverage performance analysis of genetic algorithm controlled smart antenna system
Published 2023“…In this paper, an innovative type of smart antenna based on genetic algorithm (GA) has been developed and tested. The new GA embedded solution simplifies the control of smart antenna system with increment of the accuracy of beam coverage and decrement of beam availability in compare with the conventional switch beam smart antenna. …”
Conference paper -
17
Autonomous formation flight control of multiple UAVs with motion capture system
Published 2013“…The formation developed is a Simultaneous Angle and Distance Regulation (SADR). …”
Get full text
Get full text
Thesis -
18
The evaluation of content-oriented XML document retrieval: a case study of FTMSK official letter / Hayati Abdul Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
19
The evaluation of contentoriented XML document retrieval: a case study of official letter / Hayati Abd Rahman
Published 2006“…The inverted file method has been used for the indexing techniques to develop the indexing algorithm of the FTMSK official letter. …”
Get full text
Get full text
Research Reports -
20
Conjunctions in biological neural architectures for visual pose estimation / Tom´As Maul
Published 2006“…Following this, at the formational level, various local mechanisms are investigated in the context of the biological development of the proposed neural architectures. …”
Get full text
Get full text
Thesis
