Search Results - (( java applications testing algorithm ) OR ( data integration data algorithm ))
Search alternatives:
- applications testing »
- java applications »
- testing algorithm »
- data integration »
- integration data »
- data algorithm »
-
1
Separator Database and SPM Tree Framework for Mining Sequential Patterns Using Prefixspan with Pseudoprojection
Published 2008“…A comprehensive performance study has been reported that PrefixSpan, one of the sequential pattern mining algorithms, outperforms GSP, SPADE, as well as FreeSpan in most cases, and PrefixSpan integrated with pseudoprojection technique is the fastest among those tested algorithms. …”
Get full text
Get full text
Thesis -
2
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
Integration Of Unsupervised Clustering Algorithm And Supervised Classifier For Pattern Recognition
Published 2017“…Phase 1 is mainly to evaluate the performance of clustering algorithm (K-Means and FCM). Phase 2 is to study the performance of proposed integration system which using the data clustered to be used as train data for Naïve Bayes classifier. …”
Get full text
Get full text
Thesis -
6
Numerical Integration And Data Reduction For Application In Photometry
Published 2003“…In this thesis, an algorithm based on a local interpolation scheme called the Average Angle Method was developed for numerical integration and data reduction of photometric data, and in general, for any data set sharing similar characteristics as the luminous intensity data The new interpolation scheme interpolates discrete data with piecewise cubic polynomials having a CI continuity in the interior. knots. …”
Get full text
Get full text
Thesis -
7
Load and service adaptive algorithm (LSAA) for tight coupling based integration architecture
Published 2014“…In order to fulfill the anywhere at any time data services demand, integration of existing wireless networks has attained the tremendous attention in last decades. …”
Get full text
Get full text
Conference or Workshop Item -
8
Development of an algorithm for correlation of aircraft positioning data from radar and ADS-B sensors / Koh Che Hun
Published 2019“…To fuse data from different sensors, the correlation algorithm is vital. …”
Get full text
Get full text
Get full text
Thesis -
9
Integrating genetic algorithms and fuzzy c-means for anomaly detection
Published 2005Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Hybrid Spatial-Artificial Intelligence Approach for Renewable Energy Sources Sites Identification and Integration in Sarawak State
Published 2022“…From this, the spatial criteria scheme data is produced. The MCDM-AHP algorithm is applied to the criteria scheme data to identify the number of RES sites. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
11
-
12
An Integrated Principal Component Analysis And Weighted Apriori-T Algorithm For Imbalanced Data Root Cause Analysis
Published 2016“…A semiconductor manufacturing case study with Work In Progress data and true alarm data is used to proof the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Data tampering avoidance for food supply chain traceability system using blockchain technology
Published 2019“…The results showed that the algorithm was able to preserve data integrity up to 100% accuracy.…”
Get full text
Get full text
Thesis -
15
Automated data process in participatory sensing using QR-code and EAN-13 barcode
Published 2018“…The results showed that the algorithm was able to preserving data integrity with 99.13% and up to 100% accuracy.…”
Get full text
Get full text
Thesis -
16
Evaluating integrated weight linear method to class imbalanced learning in video data
Published 2011“…This paper proposed an Integrated Weight Linear (IWL) method that integrate weight linear algorithm (WL) with principle component analysis (PCA) to eliminate imbalanced dataset in soccer video data. …”
Get full text
Get full text
Conference or Workshop Item -
17
Design and development of hybrid integrated thermal aware job scheduling on computational grid environment
Published 2016“…In this paper a Hybrid Integrated Thermal Aware Scheduling Algorithms are proposed based on baseline approaches. …”
Get full text
Get full text
Conference or Workshop Item -
18
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
19
Energy Management in Integrated Microgrids: An Optimal Schedule Controller Utilizing Gradient Descent Algorithm
Published 2024“…Weather data, including wind, solar, fuel, and battery status, is integrated into the BGD algorithm for optimizing ON and OFF schedules. …”
Conference Paper -
20
Secured route optimization in mobile IPv6 wireless networks in terms of data integrity
Published 2008“…This algorithm is able to detect and prevent the attacker from modifying the data with using an encryption algorithm at a cost of a small increase in delay. …”
Get full text
Get full text
Conference or Workshop Item
