Search Results - (( programming using stepping algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- stepping algorithm »
- testing algorithm »
- java application »
- using stepping »
-
1
Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin
Published 2012“…Image preprocessing and image extraction are done by using MATLAB. The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
Get full text
Get full text
Thesis -
2
Algorithm As A Problem Solving Technique For Teaching And Learning Of The Malay Language
Published 2019“…This conceptual teaching and learning algorithm was conducted in five steps namely the induction set; step 1; step 2; step 3; and enrichment and recovery. …”
Get full text
Get full text
Get full text
Article -
3
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…This conceptual teaching and learning algorithm was conducted in five steps namely the induction set; step 1; step 2; step 3; and enrichment and recovery. …”
Get full text
Get full text
Get full text
Article -
4
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
5
Algorithm as a problem solving technique for teaching and learning of the Malay language
Published 2019“…This conceptual teaching and learning algorithm was conducted in five steps namely the induction set; step 1; step 2; step 3; and enrichment and recovery. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
DC-link capacitor voltage control for single-phase shunt active power filter with step size error cancellation in self-charging algorithm
Published 2016“…The other two conventional self-charging algorithms were also programmed for comparison purposes. …”
Get full text
Get full text
Get full text
Article -
8
DC-link capacitor voltage control for single-phase shunt active power filter with step size error cancellation in self-charging algorithm
Published 2016“…The other two conventional self-charging algorithms were also programmed for comparison purposes. …”
Get full text
Get full text
Article -
9
-
10
Simulation and Visualization of TSP Using Ant Colony Optimization
Published 2023“…This study aims to simulate and visualize the TSP by developing a software simulation model. This model can be used to explain how to solve the traveling salesman problem by providing step-by-step instructions performed by users using ant colony optimization. …”
Get full text
Get full text
Get full text
Article -
11
-
12
Evaluation of the effectiveness and efficiency of Wagner and Fischer algorithm in retrieving Hadith translated documents / Kamarul Arifin Muhamad
Published 2002“…Two types of experiments are conducted. First experiment uses exact match, which is no method, is apply. Second experiment uses dynamic programmings apply with Wagner and Fischer algorithm.…”
Get full text
Get full text
Thesis -
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES in this research was implemented using 128- bit of key length and block size. The overall transformation encryption process consist of iterative steps called rounds. …”
Get full text
Get full text
Thesis -
15
One-step block methods for solving ordinary and delay differential equations
Published 2011“…A new modified algorithm from the existing program for solving ODEs was developed. …”
Get full text
Get full text
Thesis -
16
Evolution Performance of Symbolic Radial Basis Function Neural Network by Using Evolutionary Algorithms
Published 2023“…Each of these methods is presented in the steps in the flowchart form which can be used for its straightforward implementation in any programming language. …”
Get full text
Get full text
Get full text
Article -
17
Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm
Published 2008“…Among Information Technology graduates, Java programming assignments is an essential part of learning programming as it trains the student to solve programming assignments so that they can improve their programming skills that is useful in their professional life after graduation. …”
Get full text
Get full text
Get full text
Thesis -
18
-
19
Logic Programming In Radial Basis Function Neural Networks
Published 2013“…I used different types of optimization algorithms to improve the performance of the neural networks. …”
Get full text
Get full text
Thesis -
20
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis
