Search Results - (( java implementation level algorithm ) OR ( using ((test using) OR (code using)) algorithm ))

Refine Results
  1. 1

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The development of of simulation model involves three level of development. Level one is the development of userID and password, level two involve the insertion of the testing parameter speed coding. …”
    Get full text
    Get full text
    Get full text
    Thesis
  2. 2

    Implementation of locust inspired scheduling algorithm with huge number of servers for energy efficiency in a cloud datacenter by Azhar, Nur Huwaina

    Published 2019
    “…Cloudsim is used as Discrete Event Simulation tool and Java as coding language to evaluate LACE algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…Internet communication has become more common in this modern world recently, and one of the important algorithms used is ABS algorithm. However, most of the users have inadequate knowledge and understanding regard to this algorithm implementation in the communication field, as well as the level of security and accuracy will be questioned by the users because of the necessary to maintain the confidentiality of particular data transferred. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  4. 4

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  5. 5

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…The encryption algorithms are playing an important part in the protection level for data. …”
    Get full text
    Get full text
    Thesis
  6. 6

    1D Multigrid Solver For Finite Element Method by Azhar, Mohamad Amiruddin

    Published 2022
    “…The new algorithm also has been tested using time simulation. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Development of a hybrid dynamic fuzzy encoder and decoder model for colour QR code by Badawi, Bakri

    Published 2022
    “…The objectives of this research are to design a fuzzy encoder algorithm to handle the size limitation and static colour problems, to design a fuzzy decoder algorithm to cater for the success rate, speed and static colour issues and to test the algorithms using two different datasets from Yang et al. (2018) and the colour QR codes generated by the proposed FQR code encoder. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Steganography algorithm to hide secret message inside an image by Ibrahim, Rosziati, Teoh, Suk Kuan

    Published 2011
    “…The proposed algorithm uses binary codes and pixels inside an image. …”
    Get full text
    Get full text
    Article
  9. 9

    Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…This paper propose an optimized regression test case selection and prioritization for object-oriented software based on dependence graph model analysis of the source code and optimized the selected test case using Genetic Algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Study of optimal EG placement in radial distribution system using real coded genetic algorithm by M. H., Sulaiman, Omar, Aliman

    Published 2011
    “…RCGA is a method that uses continuous floating numbers as representation which is different from conventional GA which is using binary numbers. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Detection of head position using chain code algorithm by Fuad, Norfaiza

    Published 2007
    “…Features from the image are train using the Chain Code Algorithm (CCA) to do recognition of the crux human head then do detecting process. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Simulation of shortest path using a-star algorithm / Nurul Hani Nortaja by Nurul Hani , Nortaja

    Published 2004
    “…The steps to calculate a shortest path using A • algorithm is shown by using appropriate examples and related figures. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing by Goh, Kwang Yi

    Published 2023
    “…The experimental results showed that CrashDroid, which employs the technique considering the code complexity of the action and the use of context data during the test, was more effective than the other automated Android testing tool, AutoDroid, which did not consider the mentioned metrics.…”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    A Real-Coded Dynamic Genetic Algorithm For Optimizing Driver’s Model In Emission Test Cycle by Zeratul Izzah, Mohd Yusoh, Hisashi, Tamaki, Kazuhide, Togai

    Published 2015
    “…The algorithm is evaluated using two driving cycle data; Japan’s 10-15 mode cycle and Europe’s NEDC. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    PERFORMANCE COMPARISON OF NON-INTERLEAVED BCH CODES AND INTERLEAVED BCH CODES by MOHD. NURI, NUR DIANA

    Published 2008
    “…A reduced size or errors from previous is used in the algorithm. A graph similar to the theoretical BER vs SNR is obtained for both interleaved and non-interleaved BCH codes. …”
    Get full text
    Get full text
    Final Year Project
  17. 17

    Automatic marking system for programming subject by Chan, Jin Yee

    Published 2023
    “…To achieve this, this project use cloud compute resources that contain Docker container which act as an isolation for anonymous code execution. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  18. 18

    Automatic Additive Manufacturing Product Generation Through Computer Aided Process Planning Using 3D/4D/5D Printing by Ilias, Izzah Nadhilah

    Published 2022
    “…Then, the algorithm will be tested whether it can be extended up to 5D printing by using three different types of models with a different printing process. …”
    Get full text
    Get full text
    Monograph
  19. 19

    Online Programming Judge System (UOJ) by Tran , Quang Trung

    Published 2013
    “…Moreover, the mechanism of test cases generation using PSO algorithm is deeply analyzed. …”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Extraction of junctions, lines and regions of irregular line drawing : the chain code processing algorithm by Haron, Habibollah, Mohamed, Dzulkifli, Shamsuddin, Siti Mariyam

    Published 2003
    “…This paper discusses part of the process involved in translating the sketch or irregular line drawing into a tidy or regular line drawing, that yield three important entities namely junction, line and region. The chain code algorithm is used to find these entities. The paper also explains explicit thinning process involved before the chain code methodology. …”
    Get full text
    Get full text
    Get full text
    Article