Search Results - (( initial validation using algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- validation using »
- java application »
- using algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
-
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
-
5
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
6
Testing and validation of a Β; algorithm for cubesat satellites
Published 2016Get full text
Get full text
Get full text
Article -
7
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
8
-
9
-
10
A firefly algorithm based hybrid method for structural topology optimization
Published 2020“…The lower and upper limit of design variables (0 and 1) were used to find initial material distribution to initialize the firefly algorithm based section of the hybrid algorithm. …”
Get full text
Get full text
Article -
11
Modified Kohonen network algorithm for selection of the initial centres of Gustafson-Kessel algorithm in credit scoring
Published 2017“…A good clustering analysis implemented by good Initial Centres of clusters should be selected. To overcome this problem of Gustafson-Kessel (GK) algorithm, we proposed a modified version of Kohonen Network (KN) algorithm to select the initial centres. …”
Get full text
Get full text
Get full text
Article -
12
Novel initialization strategy: Optimizing conventional algorithms for global maximum power point tracking
Published 2024“…MATLAB/Simulink simulation model and hardware implementation based on digital signal processing (DSP) controller TMS320F28335 are two distinct methodologies used to validate the outperformance when applying the proposed initialization technique under PSC and various weather fluctuations. …”
Get full text
Get full text
Get full text
Article -
13
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The correlation based model validity tests are used to validate the identified fuzzy model.…”
Get full text
Get full text
Get full text
Article -
14
Enhancing the RC4 algorithm by eliminating the Initiative Vector (IV) transmission
Published 2025“…This paper introduces an innovative approach to address the vulnerabilities of the RC4 encryption algorithm by employing an Initiative Vector (IV). The proposed method incorporates a lengthy random text without transmitting an initialization vector. …”
Get full text
Get full text
Get full text
Article -
15
Biological-based semi-supervised clustering algorithm to improve gene function prediction
Published 2011“…However, commonclustering algorithms do not provide a comprehensive approach that look into the three categories of annotations; biologicalprocess, molecular function, and cellular component, and were not tested with different functional annotation database formats.Furthermore, the traditional clustering algorithms use random initialization which causes inconsistent cluster generation and areunable to determine the number of clusters involved. …”
Get full text
Get full text
Article -
16
Optimization of assembly line balancing with energy efficiency by using tiki-taka algorithm
Published 2023“…Lastly, a study of the industrial case was performed as a validation of the developed model and algorithm. An automotive company is selected, and the collected actual data is used for validation purposes. …”
Get full text
Get full text
Thesis -
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
PI controller based genetic algorithm for PV inverter using SPWM technique / Muhammad Hafiz Dzikri Mohammad Salihhuddin
Published 2025“…This study focuses on optimizing a three-phase photovoltaic (PV) inverter system using Sinusoidal Pulse Width Modulation (SPWM) with Genetic Algorithm (GA)-optimized Proportional-Integral (PI) controllers. …”
Get full text
Get full text
Thesis
