Search Results - (( program representation learning algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- representation learning »
- program representation »
- application testing »
- learning algorithm »
- testing algorithm »
- java application »
-
1
Object-Oriented Programming semantics representation utilizing agents
Published 2011“…Learning programming from source code examples is a common behavior among novices. …”
Get full text
Get full text
Get full text
Article -
2
Optimization Of Two-Dimensional Dual Beam Scanning System Using Genetic Algorithms
Published 2008“…Also, this research involves in developing a machine-learning system and program via genetic algorithm that is capable of performing independent learning capability and optimization for scanning sequence using novel GA operators. …”
Get full text
Get full text
Thesis -
3
Hybrid Ant Colony Optimization For Two Satisfiability Programming In Hopfield Neural Network
Published 2019“…As the number of 2SAT clauses increased, the efficiency and effectiveness of the learning phase in HNN deteriorates. Swarm intelligence metaheuristic algorithm has been introduced to reduce the learning complexity of the network. …”
Get full text
Get full text
Thesis -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Algorithms for moderating effect of emotional value from a cross-media data fusion perspective: a case study of Chinese dating reality shows
Published 2026“…During the feature extraction part, different machine-learning models are applied: Bidirectional Encoder Representations from Transformers (BERT) or Enhanced Representation through Knowledge Integration (ERNIE) for text; Convolutional Recurrent Neural Network (CRNN), and Bidirectional Long Short-Term Memory (Bi-LSTM) for audio; and Residual Neural Network (ResNet50) and Inflated 3D Convolutional Network (I3D) for video. …”
Get full text
Get full text
Article -
6
Implementation of hashed cryptography algorithm based on cryptography message syntax
Published 2019“…The important study in this research is an automated learning system for deep learning to enhance security. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
7
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
8
Simulation on Emotion Recognition for Autism Therapy
Published 2017“…This paper mainly focusing on the simulation of emotion recognition software based on the Local Binary Pattern (LBP) algorithm to extract the features from the image. The program will be used by the therapist during therapy session with the autism child in order to create more exciting environment for them to learn about the classification of basic human emotions with the help of human-computer interaction. …”
Get full text
Get full text
Final Year Project -
9
-
10
-
11
HELM based Reinforcement Learning for Goal Localization
Published 2016“…Hierarchical Extreme Learning Machine (H-ELM) algorithm was used to find good features for effective representation. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
14
-
15
-
16
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
17
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
18
Spiking Neural Network For Energy Efficient Learning And Recognition
Published 2020“…The use of applications consumes energy and hard to perform through standard programmed algorithms. Spiking neural networks have emerged that achieve favourable advantages in terms of energy and time efficiency by using spikes for computation and communication as well as solving different problems such as pattern classification and image processing. …”
Get full text
Get full text
Get full text
Article -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
