Search Results - (( developing transformation method algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- developing transformation »
- application testing »
- testing algorithm »
- method algorithm »
- java application »
-
1
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
2
Biometric identification with limited data set
Published 2019“…This situation can be a challenge for the recognition system. The most suitable method to produce best performance needs to be developed. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
4
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. …”
Get full text
Get full text
Thesis -
6
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
8
Compressing Images Using Multi-Level Wavelet Transform Algorithm (MWTA)
Published 2012“…This study aims to use Wavelet Transform Algorithm for image compression. Multi-levels were used in this study with the aim to produce better results for compressing images.The Multi-level Wavelet Transform Algorithm (MWTA) consists of three phases namely, first level compression, second level compressing in the first level, and algorithm validation by compare.Therefore, Vaishnavi method is used to design and develop the prototype model.In this study, the experiment was conducted using different images (RGB). …”
Get full text
Get full text
Get full text
Thesis -
9
Semi-automatic oil palm tree counting from pleiades satellite imagery and airborne LiDAR / Nurul Syafiqah Khalid
Published 2020“…Therefore, the final output of tree crown shows the watershed transformation algorithm is the best method for use represented oil palm tree counting in the map which is the accuracy assessment is 38.9%.…”
Get full text
Get full text
Thesis -
10
Evolution of transformer health index in the form of mathematical equation
Published 2017“…Some of the established methods of HI determination such as scoring and ranking method, tier method, matrices and multi-feature assessment model have led to the different interpretations of the final condition of a transformer. …”
Get full text
Get full text
Get full text
Article -
11
Enhancement of Single and Composite Images Based on Contourlet Transform Approach
Published 2009“…The objective evaluation steps show that the new method of enhancement not only superior to the commonly used transformation method (e.g. wavelet transform) but also to various spatial models (e.g. …”
Get full text
Get full text
Thesis -
12
-
13
Assisted History Matching by Using Genetic Algorithm and Discrete Cosine Transform
Published 2014“…Overall, an algorithm showing the combination method of both GA and DCT was successfully developed. …”
Get full text
Get full text
Final Year Project -
14
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
15
An improved split-stepwavelet transform method for anomalous radiowave propagation modeling
Published 2014“…A large number of numerical experiments are carried out to validate the performance of the proposed algorithm. Developed algorithm is compared with previously published techniques; Wavelet Galerkin Method (WGM) and Split-Step Fourier transform Method (SSFM). …”
Get full text
Get full text
Article -
16
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
17
-
18
-
19
COMPUTER AIDED SYSTEM FOR BREAST CANCER DIAGNOSIS USING CURVELET TRANSFORM
Published 2011“…We started this study by developing a diagnosis system. Five feature extraction methods were developed with curvelet and wavelet coefficients to differentiate between different breast cancer classes. …”
Get full text
Get full text
Thesis -
20
Fingerprint recognition using neural networks / Kennie Yeoh Eng Hoe
Published 2001“…Alternatively, patch-matching algorithm was developed in success of the Fourier Transform method when results -were not favorable to it. …”
Get full text
Get full text
Thesis
