Search Results - (( learning implementation flow algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- implementation flow »
- application testing »
- testing algorithm »
- java application »
- flow algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
An application of teaching–learning-based optimization for solving the optimal power flow problem with stochastic wind and solar power generators
Published 2023“…This paper proposes the implementation of metaheuristic algorithm namely, teaching–learning-based optimization (TLBO) algorithm to solve optimal power flow (OPF) problem. …”
Get full text
Get full text
Get full text
Article -
3
Optimal placement and sizing of FACTS devices for optimal power flow using metaheuristic optimizers
Published 2022“…This paper proposes the implementation of various metaheuristic algorithms in solving the optimal power flow (OPF) with the presence of Flexible AC Transmission System (FACTS) devices in the power system. …”
Get full text
Get full text
Get full text
Article -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
-
6
Modeling and optimization of cost-based hybrid flow shop scheduling problem using metaheuristics
Published 2023“…The popular optimization algorithms PSO, GA, and ACO were implemented on the CHFS model with ten optimization runs. …”
Get full text
Get full text
Get full text
Article -
7
Loss minimization in load flow simulation in power system
Published 2009Get full text
Learning Object -
8
-
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Optimization of multi-agent traffic network system with Q-Learning-Tune fitness function
Published 2019“…This study aims to explore the potential of implementing multi-agent-based Genetic Algorithm (GA) with interactive metamodel to acquire regular optimisation on dynamic characteristic of traffic flow. …”
Get full text
Get full text
Get full text
Thesis -
11
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
12
-
13
Location accuracy improvement in bluetooth low energy based indoor positioning system for remote asset monitoring / Dasmond Roy Philips
Published 2024“…This research project mainly aims to improve location accuracy of the asset tracking system through implementation of machine learning algorithms and parameters tuning. …”
Get full text
Get full text
Get full text
Thesis -
14
-
15
-
16
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
17
-
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
Flow-based approach on bro intrusion detection
Published 2017“…Then, the model made use the machine learning classification algorithms for attribute evaluation and Bro policy scripts for detecting malicious flows. …”
Get full text
Get full text
Get full text
Article
