Search Results - (( developing model extraction algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- extraction algorithm »
- application testing »
- testing algorithm »
- developing model »
- model extraction »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
3
Agent-based extraction algorithm for computational problem solving
Published 2015“…The results show that the extraction algorithm has been able to extract 100 % of the information correctly. …”
Get full text
Get full text
Thesis -
4
An Information Retrieval Algorithm to Extract Influential Factors
Published 2012“…This indicates that the algorithm was able to produce a good model. The extraction algorithm developed showed that influencial factors produced could be used as guideline for companies to monitor and strategize ways for business improvement.…”
Get full text
Get full text
Get full text
Thesis -
5
-
6
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
8
-
9
Feature extraction using active appearance model algorithm with Bayesian classification approach
Published 2013“…Face recognition is one of the most important and rapidly advanced active research areas of computer science.In spite of the large number of developed algorithms, real-world performance of face recognition has been disappointing. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
-
11
-
12
-
13
Development Of Water Quality Index Prediction Model For Penang Rivers Using Artificial Neural Network
Published 2021“…Prior to the development of ANN-based WQI prediction model, the BR algorithm was chosen with two-, three-, four-, five- and six-neuron architectures for 60% and 70% training. …”
Get full text
Get full text
Monograph -
14
-
15
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
16
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
17
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
18
-
19
Optimal timber transportation planning in tropical hill forest using bees algorithm
Published 2022“…This study proposed a multi-objective linear programming model with Bees algorithm (BA) to find an optimal cost TTP for extraction, forest road, and landing locations. …”
Get full text
Get full text
Thesis -
20
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…The accuracy of fake news detection models relies mainly on the quality of the extracted features and the method used in detection. …”
Get full text
Get full text
Get full text
Get full text
Thesis
