Search Results - (( java application testing algorithm ) OR ( software formation using algorithm ))
Search alternatives:
- application testing »
- software formation »
- testing algorithm »
- java application »
- formation using »
- using algorithm »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…An attacker can easily reconstruct source code from such intermediate formats to extract sensitive information such as proprietary algorithms present in the software. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
A method for group formation using genetic algorithm
Published 2010“…However, due to lack of programming skills especially in Java programming language, most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in programming.This paper presents a method for group formation using genetic algorithm, where the members for each group will be generated based on the students’ programming skill.…”
Get full text
Get full text
Get full text
Article -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
6
RELMARK: An innovative algorithm for preprocessing of transactional business data
Published 2015“…Association rule mining is a popular research topic due to many useful applications.The initial task in producing association rule is to ensure that only suitable data formats are fed into the mining process.Providing a correct data format for association rule mining is an essential and crucial task as wrong data will yield wrong results and interpretations.In this research work, an efficient algorithm for converting relational data format into transactional data format is presented.This transactional data format suited the SAS Enterprise Miner Software for association rule mining technique. …”
Get full text
Get full text
Article -
7
Adopting Jaya Algorithm for Team Formation Problem
Published 2020Get full text
Get full text
Get full text
Conference or Workshop Item -
8
-
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Registration and billing system
Published 2005“…To over come these problems,a Registration and Billing System Prototype have been developed.The format of the system prototype is a web-based application.The purpose of this development is to solve the existing problems found in the existing system.A software development process called Rapid Software Development Life Cycle(RSDLC) has been used to develop this system prototype.The purpose of using this software development process is to shorten the time for the software development process.The tools of the software development are Macromedia Dreamweaver MX 6.0; the JSP web dynamic programming language and Oracle 9i as the system database.The Registration and Billing System Prototype uses an integrated system database to store the patient data. …”
Get full text
Get full text
Undergraduates Project Papers -
11
-
12
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
13
The use of the Bayesian approach in the formation of the student's competence in the ICT direction
Published 2019“…Developed an integrated algorithm for the formation of the competence of training in the direction of IT.…”
Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012“…The result which is the fault location result is obtained through the complete process which involves the database formation acquired through the PSCAD/EMTDC software simulator and the fault location distance calculation carried out by the MATLAB software. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
-
19
3D silhouette rendering algorithms using vectorisation technique from Kedah topography map
Published 2004“…Contour data from a topography map are convert from raster to vector (vectorisation) in order to create a grid terrain Digital Elevation Model (DEM) data. The vectorisation software has been used for producing these data. The data then convert into the format that suitable for existing 3D silhouette software. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project
