Search Results - (( java application ((testing algorithm) OR (learning algorithm)) ) OR ( using a bit algorithm ))

Refine Results
  1. 1
  2. 2

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Features selection for intrusion detection system using hybridize PSO-SVM by Tabaan, Alaa Abdulrahman

    Published 2016
    “…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    A new digital watermarking algorithm using combination of Least Significant Bit (LSB) and inverse bit by Bamatraf, Abdullah, Ibrahim, Rosziati, Mohd. Salleh, Mohd. Najib

    Published 2011
    “…In this paper, we introduce a new digital watermarking algorithm using least significant bit (LSB). …”
    Get full text
    Get full text
    Article
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14

    The performance of block decoding using Dorsch algorithm / Husna Abdul Rahman, Ros Shilawani S. Abdul Kadir and Farah Yasmin Abdul Rahman. by Abdul Rahman, Husna, S. Abdul Kadir, Ros Shilawani, Abdul Rahman, Farah Yasmin

    Published 2007
    “…The conventional decoding method is hard decision based whereby the message of the demodulator is quantized only to two levels. The demodulator makes a firm decision whether a bit is a 0 or a 1, which are called hard bits. …”
    Get full text
    Get full text
    Research Reports
  15. 15

    Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin by Nasaruddin, Nor Intan Shafini

    Published 2012
    “…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm by Yasin, Azman, M. Zeki, Akram, Mohammed, Ghassan N.

    Published 2013
    “…In this case, when the two hidden bits are equal to the original bits, there will be no change to the other remaining bits.However, if the original value is not equal to the embedded one, the nearest pixel to the original one will be chosen as the watermarked image.The second method, GA method is used to embed two bits of watermarking data within every pixel of the original image and to find the optimal value based on the existing DISB.On the other hand, if the two embedded bits are equal to the original bits then this means the watermarked image is still the same as the original one without any changes, while in the other case GA is used in determining the minimum fitness value in which the fittest is the absolute value between the pixel and chromosome and the value of chromosome between 0-255.The results indicate that the two methods produce a high quality watermarked image, but there is a big difference in the processing time, so the DISB method is faster than the GA method.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali by Ali, Hikma Farah

    Published 2019
    “…As encryption and decryption of DES uses same cipher key by 56 bit. Proposed algorithm AES, has a different key sizes ,as 128,192 and 256. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Improving the security of LBlock lightweight algorithm using bit permutation by AlDabbagh, Sufyan Salim Mahmood, Alshaikhli, Imad Fakhri Taha

    Published 2013
    “…LBlock uses word permutation to do the diffusion while this research uses bit permutation to increase the number of active Substitution box (S-box). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  19. 19

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  20. 20

    Security analysis of blowfish algorithm by Alabaichi, Ashwak Mahmood, Ahmad, Faudziah, Mahmod, Ramlan

    Published 2013
    “…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. …”
    Get full text
    Get full text
    Conference or Workshop Item