Search Results - (( developing function using algorithm ) OR ( service application testing algorithm ))
Search alternatives:
- developing function »
- service application »
- application testing »
- testing algorithm »
- using algorithm »
-
1
An Innovative Signal Detection Algorithm in Facilitating the Cognitive Radio Functionality for Wireless Regional Area Network Using Singular Value Decomposition
Published 2011“…In order to use the algorithm effectively, users need to balance between detection accuracy and execution time. …”
Get full text
Get full text
Get full text
Thesis -
2
Development of multi-objective optimization methods for integrated scheduling of handling equipment (AGVs, QCs, SP-AS/RS) in automated container terminals
Published 2012“…Therefore, two meta-heuristic algorithms, namely genetic algorithm (GA) and simulated annealing (SA) algorithm, were developed to optimize the integrated scheduling of handling equipment. …”
Get full text
Get full text
Thesis -
3
Intent-IQ: customer’s reviews intent recognition using random forest algorithm
Published 2025“…The validation and functionality testing conducted on the system reflects that the system works as expected. …”
Get full text
Get full text
Get full text
Article -
4
XML web services / Wong Kok Chuan
Published 2003“…Next is the implementation phase which covers a brief description on the development environment used, explanations on a few algorithms used and the coding techniques and patterns which I followed. …”
Get full text
Get full text
Thesis -
5
A new hybrid multiaxial fatigue life model based on critical plane continuum damage mechanics and genetic algorithm
Published 2015“…The model is simple in application with the use of genetic algorithm for model calibration making use of only the material fatigue limit. …”
Get full text
Get full text
Thesis -
6
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…Upon verification, a demonstration application prototype that performs RSA encryption and decryption is developed using Visual Basic 6.0. …”
Get full text
Get full text
Thesis -
7
Routing A ware Distributed Service Discovery Architecture with Intelligent Message Routing
Published 2012“…A suitable query routing algorithm was developed and tested with the DSD architecture.…”
Get full text
Get full text
Thesis -
8
A novel peer-to-peer SMS security solution using a hybrid technique of NTRU and AES-Rijndael
Published 2010“…The developed application is tested on real equipment such as a Nokia N70. …”
Get full text
Get full text
Get full text
Article -
9
Tobi-RC mobile application: Development of remote control car program over bluetooth system / Ain Amirah Hussin
Published 2016“…The project achieve objectives by using RAD (Rapid Application Development) approach as the guideline and by making sure that this application is filled with great user experiences and functionality goals. …”
Get full text
Get full text
Thesis -
10
Real time traceability module for halal logistic transportation using GPS and geofence technique
Published 2016“…A comparison of performance and result of the geofence technique and Family Locator application, developed by Sygic, was made. A user acceptance test has been implemented and most of the respondents agreed that this module will benefit the Halal logistic provider in providing data on real time traceability. …”
Get full text
Get full text
Thesis -
11
-
12
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
Published 2012“…To simulate the agents, Oracle database packages and triggers are used to implement agent functions, and Oracle jobs are utilized to create agents. …”
Get full text
Get full text
Thesis -
13
Enhancement of impact force determination with modal transformation method by using integration and data filtering /Khoo Shin Yee
Published 2013“…The low quality of fitting a modal model by using modal parameters obtained from the polynomial curve fitting algorithm is highlighted. …”
Get full text
Get full text
Thesis -
14
Operational structural damage identification using de-noised modal feature in machine learning / Chen Shilei
Published 2021“…By integrating ISMA, both supervised and unsupervised machine learning algorithms were investigated to develop real-time damage identification schemes. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
17
Computing the autopilot control algorithm using predictive functional control for unstable model
Published 2009“…This paper discusses the computing development of a control algorithm using Predictive Functional Control (PFC) for model-based that having one or more unstable poles. …”
Get full text
Get full text
Conference or Workshop Item -
18
-
19
Design and Implementation of Intelligent Interoperability Framework for Heterogeneous Subsystems in Smart Home Environment
Published 2011“…Significant growths of subsystems are visible especially with new services, applications and devices in smart home environment. …”
Get full text
Get full text
Thesis -
20
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…I used different types of optimization algorithms to improve the performance of the neural networks. …”
Get full text
Get full text
Thesis
