Search Results - (( next generation using algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- generation using »
- java application »
- using algorithm »
- next »
-
1
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. …”
Get full text
Get full text
Thesis -
2
Development of least square adjustment application for traversing / Harith Fadhillah Soeb
Published 2019“…In addition, the development stage started by perform calculation process using MATLAB software. Next, the algorithm for calculation process was generated using the Eclipse application that uses Java programming language. …”
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game
Published 2015“…In the last experiment, the results showed that DE and EP algorithms can generate superior controllers whilst PDE is only capable to generate sub-optimal controllers. …”
Get full text
Get full text
Get full text
Thesis -
6
Implement edge pruning to enhance attack graph generation using the naïve approach algorithm
Published 2024“…For this issue, this study proposes using the naïve approach prune algorithm and using Personal agents to reduce the reachability time in calculating between the nodes and to remove unnecessary edges, minimizing the attack graph’s complexity. …”
Get full text
Get full text
Get full text
Get full text
Article -
7
Fuzzy logic-based intelligent scheme for enhancing QoS of vertical handover decision in vehicular ad-hoc networks
Published 2017“…This study proposes a vertical handover decision algorithm that uses a Fuzzy Logic (FL) algorithm, to increase QoS performance in heterogeneous vehicular ad-hoc networks (VANET). …”
Get full text
Get full text
Get full text
Article -
8
Design of an Ultra High Speed AES Processor for Next Generation IT Security.
Published 2011“…The proposed design addresses the next generation IT security requirements: the resistance against all crypto-analytical attacks and high speed with low latency. …”
Get full text
Get full text
Article -
9
Trajectory planning and simulation for 3d printing process
Published 2022“…The output of slicing algorithm will be used as input of infill generator to generate infill vertices based on the infill density and infill pattern that decided by users. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
10
Performance analysis of bacterial genome assemblers using illumina next generation sequencing data / Nur ‘ Ain Mohd Ishak
Published 2020“…The advancement of next generation sequencing (NGS) technology has revolutionized the field of genomic and genetic studies. …”
Get full text
Get full text
Get full text
Thesis -
11
Attack graph construction for enhancing intrusion prediction based on vulnerabilities metrics
Published 2023“…This work aims to generate a faster and less complexity attack graph and enhance the attack graph analysis to improve the detection and prediction of the attack, the attack's next step, and discover the weakest path that an attacker might use. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
12
VLSI floor planning optimization using genetic algorithm and cross entropy method / Angeline Teoh Szu Fern
Published 2012“…CE is a new algorithm that was recently developed using probability. …”
Get full text
Get full text
Thesis -
13
Reliability assessment of power generation systems using intelligent search based on disparity theory
Published 2017“…The simulation result shows the DEGA can generate a larger variety of the individuals in an early stage of the next population generation. …”
Get full text
Get full text
Get full text
Article -
14
Attack prediction to enhance attack path discovery using improved attack graph
Published 2022“…The next-generation cyber defense that relies on predictive analysis is more proactive than existing technologies that rely on intrusion detection. …”
Get full text
Get full text
Get full text
Article -
15
-
16
-
17
Comparison between alpha beta pruning algorithm and greedy algorithm in designing winning strategies in the game of checkers / Christy Jr Tan
Published 2007“…The algorithm is useful in some of the game search available today. …”
Get full text
Get full text
Student Project -
18
Enhanced genetic algorithm optimization model for a single reservoir operation based on hydropower generation: case study of Mosul reservoir, northern Iraq
Published 2016“…The GAOM achieved an increase in hydropower generation in 17 scenarios using these two algorithms, with the Salg being superior in all scenarios. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Reliability Assessment of Power Generation Systems Using Intelligent Search Based on Disparity Theory
Published 2017“…The simulation result shows the DEGA can generate a larger variety of the individuals in an early stage of the next population generation. …”
Get full text
Get full text
Get full text
Article
