Search Results - (( processes reduction using algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  3. 3

    Parallelization of noise reduction algorithm for seismic data on a beowulf cluster by Aziz, I. A., Sandran, T., Haron, N. S., Hasan, M. H, Mehat, M.

    Published 2010
    “…This paper presents the parallelization of a sequential noise reduction algorithm for seismic data processing into a parallel algorithm. …”
    Get full text
    Get full text
    Citation Index Journal
  4. 4

    An Alternative Algorithm for Soft Set Parameter Selection using Special Order by Mohammed, Mohammed Adam Taheir, Wan Maseri, Wan Mohd, Ruzaini, Abdullah Arshah, Mungad, M., Sutoyo, Edi, Chiroma, Haruna

    Published 2015
    “…Comparative analysis were performed between the proposed algorithm and the state-of-the-art parameter reduction algorithm using several soft set in terms of parameter reduction…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    An enhanced soft set data reduction using decision partition order technique by Mohammed, Mohammed Adam Taheir

    Published 2017
    “…The results show that the decision partition order technique performs up to 50% in parameter reduction, while some algorithms could not obtain any reduction. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Optimizing peak reduction carriers for OFDM based broadband systems by Ting, Sie King

    Published 2008
    “…Many techniques have been applied for peak-to-average power ratio (PPAPR) reduction. The use of peak reduction carrier (PRC) scheme proposed by Lawrey and Kikkert (1999) for PAPR reduction is further investigated in this research work for the PRCs search complexity of the algorithm. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Improving ant swarm optimization with embedded vaccination for optimum reducts generation by Pratiwi, Lustiana, Choo, Yun Huoy, Draman @ Muda, Azah Kamilah, Draman @ Muda, Noor Azilah

    Published 2013
    “…This paper proposes a hybrid ant swarm optimization algorithm by using immunity to discover better fitness value in optimizing rough reducts set. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11
  12. 12
  13. 13

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A.

    Published 2022
    “…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
    Get full text
    Get full text
    Get full text
    Article
  15. 15

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Ahmed Dheyab, Saad, Mohammed Abdulameer, Shaymaa, Mostafa, Salama A

    Published 2022
    “…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2022
    “…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17

    Efficient Machine Learning Model for DDoS Detection System Based on Dimensionality Reduction by Dheyab, Saad Ahmed, Mohammed Abdulameer, Shaymaa, Mostafa, Salama

    Published 2023
    “…The results show that using dimensionality reduction techniques along with the ML algorithms with a dataset containing high-dimensional data significantly improves the classification results. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18
  19. 19

    A proposed design for noise reduction algorithm in seismograph on high performance computing using F-K filter by I.A., Aziz, T., Sandran, N.S., Haron, M., Mehat

    Published 2008
    “…The algorithm of interest is the F-k filter which can be optimized by executing it using parallel processing architecture. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project