Search Results - (( process implementation re algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- process implementation »
- application testing »
- implementation re »
- testing algorithm »
- java application »
- re algorithm »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Removal of heavy metals from water by functionalized carbon nanotubes with deep eutectic solvents: An artificial neural network approach / Seef Saadi Fiyadh
Published 2019“…The best result achieved for Pb2+ removal using ANFIS algorithm is with RE 7.078%. For As3+ removal using different adsorbents, two algorithms were applied for the modelling, the feed-forward back-propagation maximum RE achieved is 5.97% while, the NARX algorithm achieved better accuracy with maximum RE of 5.79%. …”
Get full text
Get full text
Get full text
Thesis -
3
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
4
Design and analysis of sequence generator module using eulerian path algorithm for DNA fragment assembly / Mustaqim Mohd Subri
Published 2013“…DNA fragment assembly is a process to reassemble DNA fragments into several others sequence similar to the process of completing a puzzle. …”
Get full text
Get full text
Student Project -
5
Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems
Published 2008“…The optimized GDF and GSF can be used in real implementations. GDF and GSF controllers are evaluated for two test cases namely “two-part-type production line” and “re-entrant production system”. …”
Get full text
Get full text
Thesis -
6
An ensemble of neural network and modified grey wolf optimizer for stock prediction
Published 2019“…The research implements stock prediction analysis as a case study for training the neural network by adopting MGWO algorithm. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
-
10
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
11
Disparity Refinement Process Based On Ransac Plane Fitting For Machine Vision Applications
Published 2017“…This paper presents a new disparity map refinement process for stereo matching algorithm and the refinement stage that will be implemented by partitioning the place or mask image and re-projected to the preliminary disparity images. …”
Get full text
Get full text
Get full text
Get full text
Article -
12
Penilaian esei berbantukan komputer menggunakan teknik Bayesian dan pengunduran linear berganda
Published 2006“…This study emphasized on optimization of prediction on discourse elements and writing style that leading to the development of CbAS through four phases of research methodology. (1) Pre-processing and data extraction phase where essay will be parsed into word (token) and implemented Word Correction Algorithm to re-correct the misspell word. (2) Training process of determination and classification of discourse elements using Multivariate Bernoulli Model (MMB) Technique. …”
Get full text
Get full text
Thesis -
13
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
14
Enhance efficiency of answering XML keyword query using incompact structure of MCCTree
Published 2012“…If the result cannot be used directly by the ranking method, the algorithm has an ineffective process. Moreover, if the ineffective process requires re-examining the original tree, the efficiency of the process of the algorithm will be reduced. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Classification of Learner Retention using Machine Learning Approaches
Published 2021“…Learner retention issues require a huge commitment from a university as the process of monitoring learners' re-registration status from the beginning of each semester until they graduate can be quite tedious. …”
Get full text
Get full text
Conference or Workshop Item -
18
Gripping controller design for a one-degree-of-freedom robotic hand model based on slip detection
Published 2016“…The robotic hand system comprises a new algorithm for data extraction and signal processing analysis that are measured from an object re-gripping operation based on slip detection information. …”
Get full text
Get full text
Thesis -
19
Gripping an object based on inspection of slip events for a robotic hand model
Published 2017“…The robotic system has attempted to accomplish the re-gripping mission autonomously. Therefore, an automatic feedback control algorithm is developed to perform re-gripping tasks based on the distance at which an object has slipped. …”
Get full text
Get full text
Get full text
Article -
20
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project
