Search Results - (( risk simulation learning algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- simulation learning »
- application testing »
- learning algorithm »
- testing algorithm »
- java application »
- risk simulation »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Ensemble Dual Algorithm Using RBF Recursive Learning for Partial Linear Network
Published 2011“…Simulations with pressure liquid storage tanks problems have tested this learning approach.…”
Get full text
Get full text
Book Section -
3
Comparative analysis of danger theory variants in measuring risk level for text spam messages
Published 2024journal::journal article -
4
Algorithm comparison for data mining classification: assessing bank customer credit scoring default risk
Published 2024“…This study uses machine learning approaches to simulate consumer credit risk and compares the results to the logistic model, determining if machine learning improves client default ratings. …”
Get full text
Get full text
Get full text
Article -
5
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
6
An immunological-based simulation: A case study of risk concentration for mobile spam context assessment
Published 2024Get full text
Get full text
journal::journal article -
7
StockMaster simulator / Nor Hamiza Mohd Noor ... [et al.]
Published 2023“…Introducing StockMaster, a simulator website that offers a game that follows the real time market data, virtual trading platform where users can learn, practise, and understand Islamic finance-based stock market simulation tactics without risking real money. …”
Get full text
Get full text
Book Section -
8
-
9
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
10
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
11
-
12
-
13
EDITORIAL: INTEGRATION OF HYDROLOGICAL MODELS AND MACHINE LEARNING TECHNIQUES FOR WATER RESOURCES MANAGEMENT
Published 2025“…Physics-based models such as SWAT, VIC, and HEC-HMS simulate watershed processes, while hydraulic models like HEC-RAS and MIKE SHE assess flood risks. …”
Get full text
Get full text
Get full text
Get full text
Article -
14
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
15
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
16
Design, development and evaluation of a game-based learning application for room housekeeping
Published 2024“…The paper concludes with a discussion on potential enhancements such as incorporating adaptive learning algorithms and multiplayer features to support collaborative learning. …”
Get full text
Get full text
Get full text
Article -
17
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
18
Risk Concentration for Context Assessment (RiCCA) of SMS Messages using Danger Theory
Published 2024“…Through a series of simulation with the deployment of merged dataset from UCI Machine Learning and self-collected spam messages, has indicated RiCCA as a reliable medium for measuring the risk concentration. …”
thesis::doctoral thesis -
19
-
20
An Effective Fast Searching Algorithm for Internet Crawling Usage
Published 2016“…The search algorithm is a crucial part in any internet applications. …”
Get full text
Get full text
Get full text
Conference or Workshop Item
