Search Results - (( processes identification _ algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- processes identification »
- application testing »
- testing algorithm »
- java application »
-
1
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. …”
Get full text
Get full text
Get full text
Thesis -
2
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
Adaptive Linear System Identification over Simulated Wireless Environment
Published 2009“…This shows that the random loss of these observations (which are vital and core element of identification process) might deter the system modeling process. …”
Get full text
Get full text
Thesis -
6
-
7
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
8
Deterministic Mutation-Based Algorithm for Model Structure Selection in Discrete-Time System Identification
Published 2011“…Model structure selection is one of the important steps in a system identification process. Evolutionary computation (EC) is known to be an effective search and optimization method and in this paper EC is proposed as a model structure selection algorithm. …”
Get full text
Get full text
Get full text
Article -
9
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
10
Linear-PSO with binary search algorithm for DNA Motif Discovery / Hazaruddin Harun
Published 2015“…In this study, the MD is a process to discover all possible motifs that existed in DNA sequences whereas Motif Identification (MI) is a process to identify the correct motif that can represent a selected species. …”
Get full text
Get full text
Book Section -
11
-
12
An Algorithm for Summarizing Strategies Identification
Published 2008Get full text
Get full text
Get full text
Article -
13
Relevance detection and summarizing strategies identification algorithm using linguistic measures / Seyed Asadollah Abdiesfandani
Published 2016“…We then develop a new algorithm to address the summarizing strategies identification problem. …”
Get full text
Get full text
Thesis -
14
Date store management in sliding window based on-line identification algorithms
Published 2001“…A key element of this process is data store management. This paper provides a brief overview of several sliding window algorithms used in on-line identification. …”
Get full text
Get full text
Conference or Workshop Item -
15
Statistical computing for forensic firearm pattern identification: Evaluating a fisher linear discriminant analysis-based algorithm against fixed-impulse noise
Published 2025“…However, these systems require physical verification by experts, resulting in the process being time-consuming. Previous studies developed a Fisher Linear Discriminant Analysis (FLDA)-based ballistic identification algorithm to address this limitation, encompassing image pre-processing, feature extraction, and identification. …”
Get full text
Get full text
Get full text
Article -
16
Linear-pso with binary search algorithm for DNA motif discovery / Hazaruddin Harun
Published 2015“…In this study, the MD is a process to discover all possible motifs that existed in DNA sequences whereas Motif Identification (MI) is a process to identify the correct motif that can represent a selected species. …”
Get full text
Get full text
Thesis -
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
Simultaneous Computation of Model Order and Parameter Estimation for System Identification Based on Gravitational Search Algorithm
Published 2015“…Most significant steps of system identification process are generally summarized into four main stages. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article
