Search Results - (( java application testing algorithm ) OR ( identification _ method algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee by Por, Lip Yee

    Published 2012
    “…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  5. 5

    Recursive Subspace Identification Algorithm Using The Propagator Based Method by Jamaludin, Irma Wani, Abdul Wahab, Norhaliza

    Published 2017
    “…In this paper, the recursive subspace identification algorithm based on the propagator method which avoids the SVD computation is proposed. …”
    Get full text
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Smoothed functional algorithm with norm-limited update vector for identification of continuous-time fractional-order Hammerstein Models by Mok, Ren Hao, Mohd Ashraf, Ahmad

    Published 2024
    “…This article proposes an identification method of continuous-time fractional-order Hammerstein model using smoothed functional algorithm with a norm-limited update vector (NL-SFA). …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…We then develop a new algorithm to address the summarizing strategies identification problem. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Hybrid DE and PEM algorithm for identification of small scale Autonomous helicopter model by Legowo, Ari

    Published 2012
    “…The proposed hybrid identification method explored the evolutionary search optimization strength of DE for parameter initialization for PEM identification algorithm…”
    Get full text
    Get full text
    Monograph
  11. 11

    Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification by Abd Samad, Md Fahmi

    Published 2011
    “…Model structure selection is one of the important steps in a system identification process. Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14
  15. 15

    MULTIVARIABLE CLOSED-LOOP SYSTEM IDENTIFICATION USING ITERATIVE LEAKY LEAST MEAN SQUARES METHOD by MOHAMED OSMAN, MOHAMED ABDELRAHIM

    Published 2017
    “…In this thesis. iterative Leaky Least Mean Squares (LLMS) based methods are proposed to address the limitations ofLS method in MultiInput Multi-Output (MIMO) closed-loop system identification. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  17. 17
  18. 18

    Modified multi-verse optimizer for nonlinear system identification of a double pendulum overhead crane by Julakha, Jahan Jui, Mohd Ashraf, Ahmad, Muhammad Ikram, Mohd Rashid

    Published 2021
    “…In the HMVOSCA algorithm, the new position updating mechanism of the traditional MVO method is modified based on the sine function and cosine function which is taken from the Sine Cosine Algorithm (SCA). …”
    Get full text
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20