Search Results - (( knowledge identification modelling algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Identification model for hearing loss symptoms using machine learning techniques by Nasiru Garba Noma

    Published 2014
    “…The model is implemented using both unsupervised and supervised machine learning techniques in the form of Frequent Pattern Growth (FP-Growth) algorithm as feature transformation method and multivariate Bernoulli naïve Bayes classification model as the classifier. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4
  5. 5

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  6. 6

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Fuzzy modelling using firefly algorithm for phishing detection by Noor Syahirah, Nordin, Mohd Arfian, Ismail, Mezhuyev, Vitaliy, Shahreen, Kasim, Mohd Saberi, Mohamad, Ashraf Osman, Ibrahim

    Published 2019
    “…A fuzzy system is a rule-based system that uses human experts’ knowledge to make a particular decision, while fuzzy modeling refers to the identification process of the fuzzy parameters. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10

    An artificial immune system model as talent performance predictor / Siti ‘Aisyah Sa’dan, Hamidah Jantan and Mohd Hanapi Abdul Latif by Sa’dan, Siti ‘Aisyah, Jantan, Hamidah, Abdul Latif, Mohd Hanapi

    Published 2016
    “…The objective of this study is to propose a prediction model based on bio-inspired algorithm for talent knowledge discovery through some experiments. …”
    Get full text
    Get full text
    Research Reports
  11. 11

    Plant identification using combination of fuzzy c-means spatial pyramid matching, gist, multi-texton histogram and multiview dictionary learning by Safa, Soodabeh

    Published 2016
    “…The combination of gist, MTH and SIFT features increased the performance of image identification and showed 49% accuracy. Moreover, instead of concatenating feature vectors together and send to classifier, sparse coding and dictionary learning methods are used and instead of considering all features as one view (visual feature), K-SVD algorithm that is one of the famous algorithms for sparse representation is optimized and developed to multi-view model.The experimental results prove that the proposed methods has improved accuracy by 53.77% compared to concatenating features and classic K-SVD dictionary learning model as well.…”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  14. 14
  15. 15

    Model input and structure selection in multivariable dynamic modeling of batch distillation column pilot plant / Ilham Rustam by Rustam, Ilham

    Published 2015
    “…Further, after a careful investigation into the OLS algorithm, it was shown that the ERR technique which is an essential part of the algorithm to reach model parsimony, has led the resultant model to select an incorrect model terms albeit some improvement in model selection criteria and validation method adopted in this study. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Fuzzy modelling for reboiler system by Yusof, Rubiyah, Ibrahim, Mohd. Faisal, Khalid, Marzuki

    Published 2002
    “…Fuzzy system's ability of providing both heuristic knowledge with quantitative and accurate representation has been exploited for identification of nonlinear and complex system. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17

    Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models. by Kwad, Ayad Mahmood

    Published 2022
    “…But this method has some drawbacks, among which is difficult for complex systems, sometimes is untraceable for nonlinear behavior that almost all systems have in the real world, and requires much knowledge. Another method is system identification which is also called experimental modeling. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18
  19. 19

    Modeling of flood water level prediction using NNARX / Fazlina Ahmat Ruslan by Ahmat Ruslan, Fazlina

    Published 2015
    “…Further, after a careful investigation into the OLS algorithm, it was shown that the ERR technique which is an essential part of the algorithm to reach model parsimony, has led the resultant model to select an incorrect model terms albeit some improvement in model selection criteria and validation method adopted in this study. …”
    Get full text
    Get full text
    Thesis
  20. 20