Search Results - (( users transformation method algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- users transformation »
- application testing »
- testing algorithm »
- method algorithm »
- java application »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…In addition, this research does not require any pre-stored database to train the algorithm. This research requires the supervision from the users to train the algorithm by naming the region. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
A new discrete cosine transform-based energy detection scheme investigation using bartlett periodogram method in cognitive radio spectrum sensing
Published 2016“…This thesis focuses on the Bartlett periodogram method using the discrete cosine transform (DCT) instead of previous methods which used the discrete Fourier transform (DFT) to get the power spectrum density that is used to detect the primary user by comparing with the predefined threshold. …”
Get full text
Get full text
Thesis -
6
Algorithm enhancement for host-based intrusion detection system using discriminant analysis
Published 2004“…Moreover, this approach does not require user profiles or a user activity database in order to detect intrusions. …”
Get full text
Get full text
Thesis -
7
Evolution of transformer health index in the form of mathematical equation
Published 2017“…Some of the established methods of HI determination such as scoring and ranking method, tier method, matrices and multi-feature assessment model have led to the different interpretations of the final condition of a transformer. …”
Get full text
Get full text
Get full text
Article -
8
A study on advanced statistical analysis for network anomaly detection
Published 2005“…Moreover, this approach does not require user profiles or a user activity database in order to detect intrusions. …”
Get full text
Monograph -
9
Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique
Published 2018“…In this research, it is to apply the Hilbert-Huang transform (HHT) as a method to analyse the pressure transient signal. …”
Get full text
Get full text
Thesis -
10
Intuitive content management system via manipulation and duplication with if-else rules classification
Published 2018“…A buffering method will be implemented after the generation of website, in order to transform dynamic website into static website. …”
Get full text
Get full text
Thesis -
11
-
12
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
Published 2015“…In order to make our proposed method cost efficient, we developed Load Aware Over Cost algorithm which is 8% cost effective comparing with Load Aware algorithm. …”
Get full text
Get full text
Thesis -
13
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
14
Optimal resource allocation for NOMA wireless networks
Published 2022“…The non-orthogonal multiple access (NOMA) method is a novel multiple access technique that aims to increase spectral efficiency (SE) and accommodate enormous user accesses. …”
Get full text
Get full text
Article -
15
A hybrid Method Of Centroid-Based Clustering And Meta-Heuristic For Personalized Web Search
Published 2024thesis::doctoral thesis -
16
Homotopy perturbation method for fractional gas dynamics equation using Sumudu transform
Published 2013“…A user friendly algorithm based on new homotopy perturbation Sumudu transform method (HPSTM) is proposed to solve nonlinear fractional gas dynamics equation. …”
Get full text
Get full text
Get full text
Article -
17
Algorithm Development of Bidirectional Agglomerative Hierarchical Clustering Using AVL Tree with Visualization
Published 2024thesis::doctoral thesis -
18
Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes
Published 2025“…The findings highlight the pivotal role of Genetic Algorithms and game theory in overcoming the limitations of conventional resource allocation methods. …”
Get full text
Get full text
Get full text
Thesis -
19
loformation Retrieval - using Porter Stemming Algorithm
Published 2006“…By implementing the algorithm, it is expected from the application to retrieve only documents that relevant to the users query.…”
Get full text
Get full text
Final Year Project -
20
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis
