Search Results - (( java application testing algorithm ) OR ( re evaluation method algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- evaluation method »
- java application »
- method algorithm »
- re evaluation »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment of the hybrid obfuscation technique was to test output correctness, syntax, reversed code errors, flow test, identifiers names test, methods and classes correctness test. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Segmentation of MRI brain images using statistical approaches
Published 2011“…The non-Local means (NL-means) algorithm is a state-of-the art neighbourhood-based noisereduction method which is time-consuming and its accuracy can be improved. …”
Get full text
Get full text
Thesis -
5
Removal of heavy metals from water by functionalized carbon nanotubes with deep eutectic solvents: An artificial neural network approach / Seef Saadi Fiyadh
Published 2019“…The best result achieved for Pb2+ removal using ANFIS algorithm is with RE 7.078%. For As3+ removal using different adsorbents, two algorithms were applied for the modelling, the feed-forward back-propagation maximum RE achieved is 5.97% while, the NARX algorithm achieved better accuracy with maximum RE of 5.79%. …”
Get full text
Get full text
Get full text
Thesis -
6
A hybrid grey wolf assisted-sparrow search algorithm for frequency control of RE integrated system
Published 2023“…Moreover, the robustness of the proffered method is also evaluated under the random varying load, variation of HPS system parameter, and weather intermittency of RE resources in real-time conditions. …”
Get full text
Get full text
Article -
7
-
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
13
Hybrid metaheuristic method for clustering in wireless sensor networks / Bryan Raj Peter Jabaraj
Published 2023“…As such, this thesis proposes a hybrid metaheuristic method that consists of Sperm Swarm Optimization (SSO) algorithm and Genetic Algorithm (GA), which is termed HSSOGA. …”
Get full text
Get full text
Get full text
Thesis -
14
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
15
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
16
-
17
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Classification of Learner Retention using Machine Learning Approaches
Published 2021“…The performance of these algorithms was evaluated based on accuracy, precision, recall, and f-measure. …”
Get full text
Get full text
Conference or Workshop Item -
19
Malaysia solar energy experience: intelligent fault location algorithm for unbalanced radial distribution network including PV systems
Published 2016“…The recorded values are evaluated by a designed and tuned multi-layer feed forward neural network and the fault distances from the source are estimated accordingly. …”
Get full text
Get full text
Get full text
Article -
20
Optimizing decentralized exam timetabling with a discrete whale optimization algorithm
Published 2025“…This problem remains an active area of research and, to the authors' knowledge, has not been adequately addressed by the WOA algorithm. The method was evaluated using real-world data from the first semester of 2023/2024 for faculties at the Universiti of Sarawak, Malaysia. …”
Get full text
Get full text
Get full text
Article
