Search Results - (( users transformation method algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Image classification using two dimensional wavelet coefficients with parallel computing by Ong, Yew Fai

    Published 2020
    “…In addition, this research does not require any pre-stored database to train the algorithm. This research requires the supervision from the users to train the algorithm by naming the region. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  5. 5

    A new discrete cosine transform-based energy detection scheme investigation using bartlett periodogram method in cognitive radio spectrum sensing by Barakat, Hussein Mohammed

    Published 2016
    “…This thesis focuses on the Bartlett periodogram method using the discrete cosine transform (DCT) instead of previous methods which used the discrete Fourier transform (DFT) to get the power spectrum density that is used to detect the primary user by comparing with the predefined threshold. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Algorithm enhancement for host-based intrusion detection system using discriminant analysis by Dahlan, Dahliyusmanto

    Published 2004
    “…Moreover, this approach does not require user profiles or a user activity database in order to detect intrusions. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Evolution of transformer health index in the form of mathematical equation by Azmi, Akma, Jasni, Jasronita, Azis, Norhafiz, Ab Kadir, Mohd Zainal Abidin

    Published 2017
    “…Some of the established methods of HI determination such as scoring and ranking method, tier method, matrices and multi-feature assessment model have led to the different interpretations of the final condition of a transformer. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    A study on advanced statistical analysis for network anomaly detection by Ngadi, Md. Asri, Idris, Mohd. Yazid, Abdullah, Abd. Hanan

    Published 2005
    “…Moreover, this approach does not require user profiles or a user activity database in order to detect intrusions. …”
    Get full text
    Monograph
  9. 9

    Transient analysis for leak signature identification based on Hilbert Huang transform and integrated kurtosis algorithm for z-notch filter technique by Muhammad Hanafi, Yusop

    Published 2018
    “…In this research, it is to apply the Hilbert-Huang transform (HHT) as a method to analyse the pressure transient signal. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Intuitive content management system via manipulation and duplication with if-else rules classification by Chan, Chung Hoong

    Published 2018
    “…A buffering method will be implemented after the generation of website, in order to transform dynamic website into static website. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing by Naha, Ranesh Kumar

    Published 2015
    “…In order to make our proposed method cost efficient, we developed Load Aware Over Cost algorithm which is 8% cost effective comparing with Load Aware algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Optimal resource allocation for NOMA wireless networks by Albogamy, Fahad R., Aiyashi, M. A., Hashim, Fazirul Hisyam, Imran Khan, Choi, Bong Jun

    Published 2022
    “…The non-orthogonal multiple access (NOMA) method is a novel multiple access technique that aims to increase spectral efficiency (SE) and accommodate enormous user accesses. …”
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    Homotopy perturbation method for fractional gas dynamics equation using Sumudu transform by Singh, Jagdev, Kumar, Devendra, Kilicman, Adem

    Published 2013
    “…A user friendly algorithm based on new homotopy perturbation Sumudu transform method (HPSTM) is proposed to solve nonlinear fractional gas dynamics equation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18

    Energy-efficient power allocation for downlink non orthogonal multiple access networks based on game theory and genetic algorithm / Reem Mustafa Mah’d Al Debes by Reem Mustafa , Mah’d Al Debes

    Published 2025
    “…The findings highlight the pivotal role of Genetic Algorithms and game theory in overcoming the limitations of conventional resource allocation methods. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    loformation Retrieval - using Porter Stemming Algorithm by Zulkifly, Zurida Azita

    Published 2006
    “…By implementing the algorithm, it is expected from the application to retrieve only documents that relevant to the users query.…”
    Get full text
    Get full text
    Final Year Project
  20. 20

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis