Search Results - (( exploring affective computing algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- exploring affective »
- affective computing »
- computing algorithm »
- application testing »
- testing algorithm »
- java application »
-
1
-
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
-
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
6
An empirical study of double-bridge search move on subset feature selection search of bees algorithm
Published 2017“…The algorithm performs combination of exploitative neighbourhoods and random explorative search. …”
Get full text
Get full text
Get full text
Article -
7
-
8
A framework for design of automated lecture timetabling using memetic algorithm / Zarina Zainul Rashid, Roslan Sadjirin and Norhafizah Hashim
Published 2009“…This study describes the framework design of an automated lecture timetabling in educational institutions using soft computing techniques. In this paper, the writerspresent the use of memetic algorithm in the framework design with affective explorative ability to model huge search space. …”
Get full text
Get full text
Conference or Workshop Item -
9
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
10
-
11
Novel Metaheuristic Hybrid Spiral-Dynamic Bacteria-Chemotaxis Algorithms for Global Optimisation
Published 2015“…Bacteria chemotaxis on the other hand, is the most prominent strategy in bacterial foraging algorithm. However, the incorporation of a constant step-size for the bacteria move- ment affects the algorithm performance. …”
Get full text
Get full text
Get full text
Article -
12
-
13
A METAHEURISTIC OPTIMIZATION ALGORITHM INSPIRED BY TREE PHYSIOLOGICAL SYSTEM
Published 2018“…The main disadvantage of metaheuristic algorithm is no guarantee that a global optimum solution due to the stochastic characteristic driven by the mechanism of exploration and exploitation. …”
Get full text
Get full text
Thesis -
14
ASIC Layout Design-Space Exploration of Pan-and-Tompkins Pre-Processing Algorithm for High Efficiency Electrocardiogram Monitor
Published 2020Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Analysis of Microscopic Blood Samples for Detecting Malaria
Published 2013“…The conventional method in diagnosing the blood disease is by using manual visual examination of microscopy blood smears. However, a computer-assisted system can be designed to assist in malaria diagnosis by employing image processing, analysis and feature recognition algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
16
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
17
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
18
-
19
-
20
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article
