Search Results - (( exploring affective computing algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4
  5. 5

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    An empirical study of double-bridge search move on subset feature selection search of bees algorithm by Al-dawoodi, Aras Ghazi Mohammed, Mahmuddin, Massudi

    Published 2017
    “…The algorithm performs combination of exploitative neighbourhoods and random explorative search. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7
  8. 8

    A framework for design of automated lecture timetabling using memetic algorithm / Zarina Zainul Rashid, Roslan Sadjirin and Norhafizah Hashim by Rashid, Zarina Zainul, Sadjirin, Roslan, Hashim, Norhafizah

    Published 2009
    “…This study describes the framework design of an automated lecture timetabling in educational institutions using soft computing techniques. In this paper, the writerspresent the use of memetic algorithm in the framework design with affective explorative ability to model huge search space. …”
    Get full text
    Get full text
    Conference or Workshop Item
  9. 9

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Novel Metaheuristic Hybrid Spiral-Dynamic Bacteria-Chemotaxis Algorithms for Global Optimisation by Ahmad Nor Kasruddin, Nasir, Tokhi, M. O.

    Published 2015
    “…Bacteria chemotaxis on the other hand, is the most prominent strategy in bacterial foraging algorithm. However, the incorporation of a constant step-size for the bacteria move- ment affects the algorithm performance. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13

    A METAHEURISTIC OPTIMIZATION ALGORITHM INSPIRED BY TREE PHYSIOLOGICAL SYSTEM by ABDUL HALIM, ABDUL HANIF

    Published 2018
    “…The main disadvantage of metaheuristic algorithm is no guarantee that a global optimum solution due to the stochastic characteristic driven by the mechanism of exploration and exploitation. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Analysis of Microscopic Blood Samples for Detecting Malaria by Saw Hui, Ann

    Published 2013
    “…The conventional method in diagnosing the blood disease is by using manual visual examination of microscopy blood smears. However, a computer-assisted system can be designed to assist in malaria diagnosis by employing image processing, analysis and feature recognition algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  17. 17
  18. 18
  19. 19
  20. 20