Search Results - (( java application testing algorithm ) OR ( sequence identification system algorithm ))

Refine Results
  1. 1

    Enhancing counterfeit tag detection for RFID system using slotted aloha by Musa, Yusuf

    Published 2021
    “…The track sequence number (TSN) was integrated with the time of arrival (TOA) at the detection stage to check the sequence process for the entire system from one stage to another, thus giving the system the capability to uniquely differentiate between counterfeit tag and the genuine tag. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Parallel implementation of genomic sequences classification using modified gabor wavelet transform on multicore systems by Gunawan, Teddy Surya, Ambikairajah, Eliathamby

    Published 2012
    “…This paper presents the parallel implementation of the gene and exon identification of DNA sequences using the previously developed modified Gabor wavelet transform on multicore systems. …”
    Get full text
    Get full text
    Proceeding Paper
  4. 4
  5. 5

    SYSTEM IDENTIFICATION AND MODEL PREDICTIVE CONTROL FOR INTERACTING SERIES PROCESS WITH NONLINEAR DYNAMICS by SETYO WIBOWO, TRI CHANDRA

    Published 2009
    “…Several important issues in the identification process and real-time implementation of model predictive control algorithm are also discussed. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Fingerprint recognition system by Rohani, Abu Bakar

    Published 2005
    “…Fingerprint recognition is the oldest method which has been used in numerous applications for identification purpose in many social conditions such as access control and crime investigation.Now a day,in the era of technology the system is still using the password or smart card as an identity character for identification purpose.The problems happen when user forgot their password or lost their smart card. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  9. 9

    Kalman filter based impedance parameter estimation for transmission line and distribution line by Siti Nur Aishah, Mohd Amin

    Published 2019
    “…However, this is not true for certain low voltage systems or systems with short lines. In these cases, for transmission lines that are not fully transposed, the three sequence networks will be mutually coupled. …”
    Get full text
    Get full text
    Thesis
  10. 10

    NARX modelling for steam distillation pilot plant using binary particle swarm optimisation technique / Najidah Hambali by Hambali, Najidah

    Published 2019
    “…A system identification in control engineering field is a mathematical model based on dynamic properties of the system. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Genome-wide computational identification of biologically significant cis-regulatory elements and associated transcription factors from rice by Ho, Chai Ling, Geisler, Matt

    Published 2019
    “…In this study, we tested the applicability of two algorithms developed for other model systems for the identification of biologically significant CREs of co-expressed genes from rice. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Dataset of 16S ribosomal DNA sequences of bacteria isolated from marine red algae Kappapycus alvarezii by Rennielyn Rupert, Kenneth Francis Rodrigues, Chong, Harry Lye Hin, Wilson Thau Lym Yong

    Published 2022
    “…Taxonomic identification for the assembled sequences was achieved us- ing the online BLAST (blastn) algorithm, and the construction of a phylogenetic tree was performed using the MEGA7 soft- ware. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14
  15. 15
  16. 16

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19
  20. 20

    Dynamic modelling of a flexible beam structure using feedforward neural networks for active vibration control by Tuan Abdul Rahman, Tuan Ahmad Zahidi, As'arry, Azizan, Abdul Jalil, Nawal Aswan, Raja Ahmad, Raja Mohd Kamil

    Published 2019
    “…An experimental study was carried out to collect input-output dataset of a flexible beam system. The flexible beam was excited using a pseudo-random binary sequence (PRBS) force signal before acquiring the dynamic response of the system. …”
    Get full text
    Get full text
    Get full text
    Article