Search Results - (( java application testing algorithm ) OR ( source detection using algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    An Adaptive Switching Cooperative Source Searching And Tracing Algorithms For Underwater Acoustic Source Localization by Majid, Mad Helmi Ab.

    Published 2019
    “…In a source searching task, two possible scenarios can occur: source detected and source not detected. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Cooperative source detection using an optimized distributed levy flight algorithm by Ab.Majid, Mad Helmi, Arshad, Mohd Rizal, Yahya, Mohd Faid

    Published 2023
    “…Source signal detection plays important roles in many real-world target searching problems. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  5. 5

    Cooperative Source Detection Using An Optimized Distributed Levy Flight Algorithm by Mad Helmi Ab. Majid

    Published 2023
    “…Cooperative Source Detection Using An Optimized Distributed Levy Flight Algorithm by Mad Helmi Ab. …”
    Get full text
    article
  6. 6

    Cooperative source detection using an optimized distributed levy flight algorithm by Mad Helmi Ab. Majid

    Published 2024
    “…Cooperative source detection using an optimized distributed levy flight algorithm by Mad Helmi Ab. …”
    Get full text
    article
  7. 7
  8. 8

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    A pothole boundary detection algorithm using image segmentation technique in urban road by Mohd Shah, Hairol Nizam, Alshami, Abdallah M. M., Abdollah, Mohd Fairus, Ab Rashid, Mohd Zamzuri, Arshad, Mohd Ali

    Published 2025
    “…This study introduces a specialized algorithm designed to precisely detect and delineate the boundaries of potholes using advanced image segmentation techniques. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  10. 10

    LTE-based passive radar for ground target detection and tracking by Salah, Asem Ahmad Mohamad

    Published 2015
    “…Passive radar system constitute of a receiver without the co-located transmitter. It uses non-cooperated illumination sources for target detection and tracking. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Behaviour Analysis Among Adolescents And Children For Cyberbullying Based On Twitter And Kaggle Dataset by Afiefah Hannani, Abdul Halim

    Published 2023
    “…The purpose of this study is to see the accuracy of the algorithms and compare it. The highest algorithm will be chosen as the best model and algorithm that can be used to detect cyberbullying tweet text.…”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14
  15. 15

    Water Pollution Source Identification Based on Real-Time Monitoring System in Siak River by Kadir, E.A., Listia Rosa, S., Othman, M.

    Published 2021
    “…Data collected from the sensor analyzed use algorithm to find and check the abnormal and behavior data changing by the time. …”
    Get full text
    Get full text
    Conference or Workshop Item
  16. 16

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms by Hydara, Isatou

    Published 2024
    “…Another limitation is the limited or lack of focus on the removal of XSS vulnerabilities after their detection in the source code. Consequently, an approach called XSS-DETREM has been proposed with the objectives of combining genetic algorithms with static analysis, and a code replacement technique to detect and remove XSS vulnerabilities, respectively, to address the problem of XSS at the source code level. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Wormhole attack detection mechanism in mobile ad hoc network using neighborhood information and path tracing algorithm by Enshaei, Mehdi

    Published 2015
    “…Path Tracing (PT) Algorithm was proposed to detect and prevent exposed wormhole attacks in MANET. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Autonomous Fire Fighting Mobile Platform by Teh, Nam Khoon, Saman, Abu Bakar Sayuti, Sebastian , Patrick

    Published 2012
    “…The patrolling movement is guided by a set of lines with the use of a conventional line following algorithm but with the addition of a homing algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani by Seyed Asadollah, Abdiesfandani

    Published 2016
    “…The system is also able to detect copy- verbatim strategy, the most commonly strategy used by students. …”
    Get full text
    Get full text
    Thesis