Search Results - (( java application testing algorithm ) OR ( changes identification system algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4

    Privacy optimization and intrusion detection in modbus/tcp network-based scada in water distribution systems by Franco, Daniel Jose Da Graca Peceguina

    Published 2021
    “…Such approach is highly dependable on the clustering algorithm parameterization, and is not capable to deal with the normal system’s specification changes. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Particle swarm optimization for NARX structure selection: application on DC motor model / Mohd Ikhwan Abdullah by Abdullah, Mohd Ikhwan

    Published 2010
    “…This thesis was presents the nonlinear identification of a DC motor using Binary Particle Swarm Optimization (BPSO) algorithm, as a model structure selection method, replacing the typical Orthogonal Least Squares (OLS) used in system identification. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Hybrid intelligent methods for parameter identification and load frequency control in power system by Aqeel Sakhy, Jaber

    Published 2014
    “…Where, in the first part, the coherent identification algorithm for single and multi-area power systems with disturbances is proposed. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Self-tuning control of an electro-hydraulic actuator system by Ghazali, Rozaimi, Md Sam, Yahaya, Rahmat, Mohd Fua'ad, Jusoff, Kamaruzaman, Zulfatman, Mohd Hashim, Abd Wahab Ishari

    Published 2011
    “…Due to time-varying effects in electro-hydraulic actuator (EHA) system parameters, a self-tuning control algorithm using pole placement and recursive identification is presented. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Particle swarm optimization for NARX structure selection application on DC motor model: article / Mohd I. Abdullah by Abdullah, Mohd I.

    “…This paper presents the nonlinear identification of a DC motor using Binary Particle Swarm Optimization (BPSO) algorithm, as a model structure selection method, replacing the typical Orthogonal Least Squares (OLS) used in system identification. …”
    Get full text
    Get full text
    Article
  10. 10

    Performance analysis of robust road sign identification by Mohd Ali, Nursabillilah

    Published 2013
    “…This study describes performance analysis of a robust system for road sign identification that incorporated two stages of different algorithms. …”
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Performance analysis of robust road sign identification by Ali, Nursabillilah M, Mohd Mustafah, Yasir, Alang Md Rashid, Nahrul Khair

    Published 2013
    “…This study describes performance analysis of a robust system for road sign identification that incorporated two stages of different algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16
  17. 17
  18. 18

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Edge detection techniques for iris recognition system by Tania, U. T., Motakabber, S. M. A., Ibrahimy, Muhammad Ibn

    Published 2013
    “…Iris is one of the most reliable organ or part of human body which can be used for identification and authentication purpose. To develop an iris authentication algorithm for personal identification, this paper examines two edge detection techniques for iris recognition system. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  20. 20