Search Results - (( java application ((testing algorithm) OR (learning algorithm)) ) OR ( using a bit algorithm ))
Search alternatives:
- learning algorithm »
- testing algorithm »
- java application »
- bit algorithm »
- using a »
- a bit »
-
1
-
2
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
3
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
4
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
5
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
6
-
7
-
8
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
9
A new digital watermarking algorithm using combination of Least Significant Bit (LSB) and inverse bit
Published 2011“…In this paper, we introduce a new digital watermarking algorithm using least significant bit (LSB). …”
Get full text
Get full text
Article -
10
A fingerprint matching algorithm using bit-plane extraction method with phase-only correlation
Published 2017“…A bit-plane image requires smaller storage space than a greyscale image. …”
Get full text
Get full text
Get full text
Article -
11
-
12
An improved digital watermarking algorithm using combination of least significant bit (LSB) and inverse bit
Published 2012“…Least significant bit (LSB) is a technique that has been used for digital watermarking. …”
Get full text
Get full text
Get full text
Thesis -
13
An optimum drill bit selection technique using artificial neural networks and genetic algorithms to increase the rate of penetration
Published 2018“…A bit selection example is provided by using the Shadegan oil field drilling data. …”
Get full text
Get full text
Article -
14
The performance of block decoding using Dorsch algorithm / Husna Abdul Rahman, Ros Shilawani S. Abdul Kadir and Farah Yasmin Abdul Rahman.
Published 2007“…The conventional decoding method is hard decision based whereby the message of the demodulator is quantized only to two levels. The demodulator makes a firm decision whether a bit is a 0 or a 1, which are called hard bits. …”
Get full text
Get full text
Research Reports -
15
Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin
Published 2012“…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
Get full text
Get full text
Thesis -
16
A comparison of watermarking image quality based on dual intermediate significant bit with genetic algorithm
Published 2013“…In this case, when the two hidden bits are equal to the original bits, there will be no change to the other remaining bits.However, if the original value is not equal to the embedded one, the nearest pixel to the original one will be chosen as the watermarked image.The second method, GA method is used to embed two bits of watermarking data within every pixel of the original image and to find the optimal value based on the existing DISB.On the other hand, if the two embedded bits are equal to the original bits then this means the watermarked image is still the same as the original one without any changes, while in the other case GA is used in determining the minimum fitness value in which the fittest is the absolute value between the pixel and chromosome and the value of chromosome between 0-255.The results indicate that the two methods produce a high quality watermarked image, but there is a big difference in the processing time, so the DISB method is faster than the GA method.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Data privacy comparison using advanced encryption standard (AES) and data encryption standard (DES) / Hikma Farah Ali
Published 2019“…As encryption and decryption of DES uses same cipher key by 56 bit. Proposed algorithm AES, has a different key sizes ,as 128,192 and 256. …”
Get full text
Get full text
Thesis -
18
Improving the security of LBlock lightweight algorithm using bit permutation
Published 2013“…LBlock uses word permutation to do the diffusion while this research uses bit permutation to increase the number of active Substitution box (S-box). …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
19
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
20
Security analysis of blowfish algorithm
Published 2013“…Blowfish algorithm (BA) is a symmetric block cipher with a 64-bit block size and variable key lengths from 32 bits up to a maximum of 448 bits. …”
Get full text
Get full text
Conference or Workshop Item
