Search Results - (( java interactive effect algorithm ) OR ( its implementation method algorithm ))
Search alternatives:
- implementation method »
- interactive effect »
- its implementation »
- java interactive »
- effect algorithm »
- method algorithm »
-
1
A random search based effective algorithm for pairwise test data generation
Published 2011“…Java program has been used to test the performance of the algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
EasyA: Easy and effective way to generate pairwise test data
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Teaching and learning via chatbots with immersive and machine learning capabilities
Published 2019“…In order to address these shortcomings, seven text-based conversational chatbots for the students to learn Java in an interactive and engaging manners had been built. …”
Get full text
Get full text
Conference or Workshop Item -
4
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…Experimental results indicate that WOA outperforms or matches the effectiveness of these strategies in generating smaller test suites, particularly for higher interaction strengths. …”
Get full text
Get full text
Get full text
Article -
5
-
6
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…The result from this project is a data which is encrypted and be decrypted to its readable form. As a conclusion, Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
Get full text
Get full text
Undergraduates Project Papers -
7
Implementation of hybrid encryption method using caesar cipher algorithm
Published 2010“…This method is names after Julius Caesar who using this method to communicate with his generals.The result from this project is a data which is encrypted and be decrypted to its readable form.As a conclusion,Caesar cipher algorithm can be implemented in hybrid encryption project to make data secure and better.…”
Get full text
Get full text
Undergraduates Project Papers -
8
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Web-based RIG performance reporting system using interactive visualization techniques / Amir Hambaly Nasaruddin
Published 2019“…The result of this project is all algorithm for visualizing data is functioning and the output produced from the system is correct and effective. …”
Get full text
Get full text
Thesis -
10
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
Selection, generation and extraction of MCCTree using XMCCTree
Published 2012“…Previous research proposed notions of CLCA and MCLCA to answer keyword query in XML document. The notions are implemented in its proposed algorithms and the result, namely MCCTree, is ranked with its proposed ranking method. …”
Get full text
Get full text
Get full text
Article -
12
Dual search maximum power point algorithm based on mathematical analysis under partially-shaded conditions
Published 2016“…In evaluation part, the DSMPP algorithm has been compared with two other methods.According to both simulation and experimental results, by implementing the DSMPP technique, the GMPP can be obtained faster. …”
Get full text
Get full text
Thesis -
13
Fuzzy logic-based hill climbing technique for photovoltaic maximum power point tracking converter
Published 2013“…Maximum power point tracking (MPPT) is of paramount importance to the system as it not only maximizes system efficiency but also minimizes the return of investment in the PV installation. The hill climbing algorithm is the most common method of MPPT due to its simplicity, ease of implementation, and good performance. …”
Get full text
Get full text
Thesis -
14
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…This thesis studies the method of a string-searching algorithm. The studies describe features and methods for string searching and comparison using Wagner and Fischer algorithm. …”
Get full text
Get full text
Thesis -
15
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…This project explores scalar multiplication algorithms in Elliptic Curve Cryptography, focusing on the binary method and elliptic net method applied in Elliptic Curve Diffie-Hellman and Elliptic Curve Digital Signature Algorithm. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Training functional link neural network with ant lion optimizer
Published 2020“…Since FLNN uses Backpropagation algorithm as the standard learning algorithm, the method however prone to get trapped in local minima which affect its performance. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
Design of radix-4 single path delay fast fourier transform processor with genetic algorithms optimization
Published 2011“…This research work involves the implementation of Single Objective Genetic Algorithm (SOGA) and Multi-objectives Genetic Algorithm (MOGA) in a 16-point Radix-4 Single Path Delay Feedback (R4SDF) pipelined Fast Fourier Transform (FFT) processor. …”
Get full text
Get full text
Thesis -
18
New Fast Block Matching Algorithm Using New Hybrid Search Pattern And Strategy To Improve Motion Estimation Process In Video Coding Technique
Published 2016“…These 6 algorithms are divided into 3 main methods namely Method A, Method B, and Method C depending on their search patterns and strategies. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
19
Implementation of Color Filtering on FPGA
Published 2007“…The second is the double band-pass-filter algorithm. Work is currently conducted to quantify the effectiveness of the band-pass filtering algorithm on FPGA before proceeding to test and implement the triple and quadruple band-pass filtering methods.…”
Get full text
Get full text
Conference or Workshop Item -
20
SINE COSINE ALGORITHM BASED NEURAL NETWORK FOR RAINFALL DATA IMPUTATION
Published 2024“…The advantages of SCA can be attributed to its simple implementation, reasonable execution time, and adaptability to hybridize with other optimization methods easily. …”
Get full text
Get full text
Get full text
Book Chapter
