Search Results - (( java validating system algorithm ) OR ( program evaluation using algorithm ))

Refine Results
  1. 1

    An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance by Al-Shaibani, Alaa Alrhman Mohammed Raweh, Ahmad, Johanna, Hassan, Rohayanti, Baharom, Salmi, Antari, Dwinta Suci

    Published 2025
    “…The research experiment has shown the process of calculating the Distance matrix for the sample Java Programs and subsequent evaluation using the mutation testing approach and APFD calculation. …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2

    Human activity recognition via accelerometer and gyro sensors by Tee, Jia Lin

    Published 2023
    “…The dataset created using the proposed data engineering system is then used to train unidirectional Long Short Term Memory (LSTM) model to evaluate the efficiency of proposed system in terms of accuracy and generalization capabilities. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  3. 3

    Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC by Ismail, Haqi Khalid

    Published 2021
    “…To prove that the proposed design is suitable for IIoT, a new scheme is proposed namely a secure, efficient, and lightweight multi-factor authentication scheme for cross-domain IIoT systems (SELAMAT). In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The proposed embedded system has achieved positive outcomes in comparison to the current system and the traditional algorithm with regards to the shortest path. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Evaluation of dynamic programming among the existing stereo matching algorithms by Teo, Chee Huat, Nurulfajar, Abd Manap

    Published 2015
    “…The algorithm used on the dynamic programming is the global optimization which provides better process on stereo images like its accuracy and its computational efficiency compared to other existing stereo matching algorithms. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9

    Voltage stability margin identification using evolution programming learning algorithm / Zamzuhairi Darus by Darus, Zamzuhairi

    Published 2003
    “…This project proposed on an investigation on the voltage stability margin identification using evolution programming learning algorithm. A multilayer feed-forward artificial neural network (ANN) with evolution programming learning algorithm for calculation of voltage stability margins (VSM). …”
    Get full text
    Get full text
    Thesis
  10. 10

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Evaluation of fast evolutionary programming, firefly algorithm and mutate-cuckoo search algorithm in single-objective optimization / Muhammad Zakyizzuddin Rosselan, Shahril Irwan S... by Rosselan, Muhammad Zakyizzuddin, Sulaiman, Shahril Irwan, Othman, Norhalida

    Published 2016
    “…In this study proposes an evaluation of different computational intelligences, i.e Fast-Evolutionary Algorithm (FEP), Firefly Algorithm (FA) and Mutate-cuckoo Search Algorithm (MCSA) for solving single-objective optimization problem. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14

    Evaluation of stereo matching algorithms and dynamic programming for 3D triangulation by Teo, Chee Huat, Manap, Nurulfajar

    Published 2015
    “…The stereo matching algorithms that we applied for experimental purpose are basic block matching, sub-pixel accuracy and dynamic programming. …”
    Get full text
    Get full text
    Book Chapter
  15. 15

    Evaluation Of Stereo Matching Algorithms And Dynamic Programming For 3D Triangulation by Teo , Chee Huat, Abd Manap, Nurulfajar

    Published 2014
    “…The stereo matching algorithms that we applied for experimental purpose are basic block matching, sub-pixel accuracy and dynamic programming. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  16. 16

    Evaluation of data mining classification and clustering techniques for diabetes / Tuba Pala and Ali Yilmaz Camurcu by Pala, Tuba, Camurcu, Ali Yilmaz

    Published 2014
    “…The success evaluation of data mining classification algorithms have been realized through the data mining programs Weka and RapidMiner. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Linear array beampattern gain optimization techniques by Nagi F.

    Published 2023
    “…LMS and goal programming methods are used to evaluate the weights of the remaining array elements. …”
    Conference paper
  18. 18

    Logic Algorithm for contour following task: An evaluation using Adept SCARA Robot by Anton, S P, Samsi , Md. Said, M.A., Burhanuddin

    Published 2010
    “…This paper presents the performance evaluation of logic algorithms for contourfollowing task in order to automate the manual programming process. …”
    Get full text
    Get full text
    Article
  19. 19

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  20. 20