Search Results - (( java application testing algorithm ) OR ( source generation learning algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Unified neural network controller of series active power filter for power quality problems mitigation by Ghazanfarpour, Behzad

    Published 2013
    “…First, Widrow-Hoff algorithm is examined and its constant learning rate is modified by adding an adaptive learning rule to change the learning rate value. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4

    Object-Oriented Programming semantics representation utilizing agents by Mohd Aris, Teh Noranis

    Published 2011
    “…A formal algorithm that can be applied to any two related Java-based source codes examples is invented to generate the semantics of these source codes. …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5
  6. 6

    An optimized variant of machine learning algorithm for datadriven electrical energy efficiency management (D2EEM) by Shamim, Akhtar

    Published 2024
    “…The scope of this study is tri folded, First, an exhaustive and parametric comparative study on a wide variety of machine learning algorithms is presented to evaluate the performance of machine learning algorithms in energy load prediction. …”
    Get full text
    Get full text
    Thesis
  7. 7
  8. 8

    Development of a Bioinspired optimization algorithm for the automatic generation of multiple distinct behaviors in simulated mobile robots by Hanafi Ahmad Hijazi, Patricia Anthony

    Published 2006
    “…Results showed that robot controllers could be successfully developed using the POE-MOEA algorithm. The generated robot controllers allowed the robots to move towards to the light source even the simulation and testing environments are noticeably different.…”
    Get full text
    Get full text
    Research Report
  9. 9
  10. 10

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  11. 11

    Hybrid signal processing and machine learning algorithm for adaptive fault classification of wind farm integrated transmision line protection by Olufemi, Osaji Emmanuel, Othman, Mohammad Lutfi, Hizam, Hashim, Othman, Muhammad Murtadha, Ammar, Aker Elhadi Emhemed Alhaaj, Okeke, Chidiebere Akachukwu, Onuabuchi, Nwagbara Samuel

    Published 2019
    “…The technological advancement in integration of Renewable Green Energy Sources (RGES) like Wind Farm Generators (WFG), and Photovoltaic (PV) system into conventional power system as a future solution to meet the increase in global energy demands in order to reduce the cost of power generation, and improve on the climate change impact. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Analysis of Chinese patents associated with incremental clustering algorithms: A review / Archana Chaudhari by Chaudhari, Archana, Mulay, Preeti, Kumar Tiwari, Amit

    Published 2022
    “…To achieve learning from such dynamic data sources, incremental clustering algorithms are used mandatorily. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  19. 19
  20. 20

    Anomaly detection in system log files using machine learning algorithms / Zahedeh Zamanian by Zahedeh, Zamanian

    Published 2019
    “…This study uses synthetic CERT Insider Threat v6.2 dataset that includes five different domains of file, logon/logoff, http, device and email. This study generates 200 features from raw system log files that can be fed to machine learning. …”
    Get full text
    Get full text
    Get full text
    Thesis