Search Results - (( hindering optimization techniques algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- optimization techniques »
- hindering optimization »
- application testing »
- testing algorithm »
- java application »
-
1
Chaotic Immune Symbiotic Organisms Search algorithm for solving optimisation problem
Published 2023“…Despite the performance of these algorithms, the flaws of these algorithms hinder them from producing high-quality results. …”
Article -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
-
4
Hybrid Harmony Search Algorithm Integrating Differential Evolution and Lévy Flight for Engineering Optimization
Published 2025“…Harmony search algorithm (HSA) is extensively utilized in engineering optimization. …”
Get full text
Get full text
Get full text
Article -
5
A Framework for Green Energy Resources Identification and Integration Supported by Real-Time Monitoring, Control, and Automation Applications
Published 2025“…The second layer employed spatial data and the fuzzy Technique for Order Preference by Similarity to Ideal Solution algorithm to refine potential solar energy sites, yielding the top 100 optimal locations. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
Hybrid Harmony Search Algorithm Integrating Differential Evolution and Lévy Flight for Engineering Optimization
Published 2025“…Harmony search algorithm (HSA) is extensively utilized in engineering optimization. …”
Get full text
Get full text
Get full text
Article -
8
Balancing data utility versus information loss in data-privacy protection using k-Anonymity
“…Based on the classification accuracy, the optimal values of k and c are obtained, and thus, the optimal k and c can be used for kanonymity algorithm to anonymize optimal number of columns of the dataset.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
-
10
Hybrid harmony search algorithm integrating differential evolution and lévy flight for engineering optimization
Published 2025“…Harmony search algorithm (HSA) is extensively utilized in engineering optimization. …”
Get full text
Get full text
Get full text
Article -
11
Modelling knowledge transfer of nursing students during clinical placement / Nor Azairiah Fatimah Othman
Published 2017“…The application of the proposed algorithm has been justified as the most accurate with lower computation time as compared to other optimization techniques such as evolutionary programming (EP) and artificial immune system (AIS). …”
Get full text
Get full text
Book Section -
12
Efficient Model for Waste Load and Route Optimization
Published 2024“…We have created an optimization algorithm that usesthe forecast outcome from a prior research dataset. …”
Get full text
Get full text
Get full text
Article -
13
-
14
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
15
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
16
-
17
-
18
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
19
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
20
Automated density and growth estimation in precision aquaculture systems for prawn cultivation using computer vision techniques
Published 2024“…Additionally, traditional methods of monitoring prawn growth and well-being in underwater environments are labor-intensive and prone to inconsistencies, hindering timely decision-making processes. To address these challenges, this project proposes an innovative solution that leverages computer vision and machine learning techniques. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
