Search Results - (( java application testing algorithm ) OR ( automatic identification tree algorithm ))

Refine Results
  1. 1
  2. 2

    Modelling of the anti-collision algorithm in RFID system: article / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Article
  3. 3

    Modelling of the anti-collision algorithm in RFID system / Shafinaz Ismail by Ismail, Shafinaz

    Published 2014
    “…To avoid these collisions, there are several anti-collision algorithms used in the RFID system. The major classifications of the algorithms are Aloha based protocols and tree based protocols. …”
    Get full text
    Get full text
    Thesis
  4. 4

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  5. 5

    Multi-sensor fusion based on multiple classifier systems for human activity identification by Nweke, Henry Friday, Teh, Ying Wah, Mujtaba, Ghulam, Alo, Uzoma Rita, Al-garadi, Mohammed Ali

    Published 2019
    “…To this end, computationally efficient classification algorithms such as decision tree, logistic regression and k-Nearest Neighbors were used to implement diverse, flexible and dynamic human activity detection systems. …”
    Get full text
    Get full text
    Article
  6. 6

    Crown counting and mapping of missing oil palm tree using airborne imaging system by Kee, Ya Wern

    Published 2019
    “…A graphical user interface by using MATLAB language was created based on the best executed method to aid users in counting the trees automatically. This helps to facilitate semi-skillful users to implement the tree counting algorithms. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Power quality event characterization by Tan C.K., Kumaran V., Siam F.M., Busrah A.M.

    Published 2023
    “…This automated event characterization algorithm provides a fast identification of areas that are prone to certain types of faults, which leads to much easier identification of causes of faults in that area - such as trees, animals, nature and etc. …”
    Conference paper
  8. 8
  9. 9

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  10. 10
  11. 11
  12. 12

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Classification Modeling for Malaysian Blooming Flower Images Using Neural Networks by Muhammad Ashraq, Salahuddin

    Published 2013
    “…Results show that the overall performance of Neural Network with DOUBLE is 96.3% while actual data set is 68.3%, and the accuracy obtained from Logistic Regression with actual data set is 60.5%. The Decision Tree classification results indicate that the highest performance obtained by Chi-Squared Automatic Interaction Detection(CHAID) and Exhaustive CHAID (EX-CHAID) is merely 42% with DOUBLE. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17
  18. 18

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  19. 19
  20. 20

    Signal quality measures for pulse oximetry through waveform morphology analysis by Sukor, J. Abdul, Redmond, S. J., Lovell, N. H.

    Published 2011
    “…The performance of the proposed algorithm is compared to a manually annotated gold standard. …”
    Get full text
    Get full text
    Get full text
    Article