Search Results - (( using data (processing OR proceeding) algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
-
1
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This is a new approach that able to use by doctors to rectify the heart problem. This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. …”
Get full text
Get full text
Thesis -
2
Securing cloud data system (SCDS) for key exposure using AES algorithm
Published 2021“…After that we use to build securing cloud data system (SCDS) for key exposure using the AES algorithm for encrypting and decrypting our website cloud data and files. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
4
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
5
Face classification for three major ethnic of Orang Asli using Back Propagation Neural Network / Nor Intan Shafini Nasaruddin
Published 2012“…The image classification prototype is developed by using JAVA programming language which is based on supervised learning algorithm, Backpropagation Neural Network. …”
Get full text
Get full text
Thesis -
6
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
7
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
8
Pattern Discovery Using K-Means Algorithm
Published 2024“…This paper will discuss the results of a pattern extraction process using a clustering algorithm that is k-means. …”
Proceedings Paper -
9
HYBRID: an efficient unifying process to mine frequent itemsets
Published 2018“…In this paper, an efficient hybrid algorithm was designed using a unifying process of the algorithms Improved Apriori and FP-Growth. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
10
Privacy in medical emergency system: cryptographic and security aspects
Published 2010“…This paper shows the results of processing time of data encryption between asymmetric key algorithm (RSA) and symmetric key algorithm (AES) which includes its key-distribution processing time with client’s public key (RSA) from small to large amount of data. …”
Get full text
Get full text
Get full text
Proceeding Paper -
11
Immune network algorithm in monthly streamflow prediction at Johor river
Published 2014“…The model of Immune Network Algorithm used in this study is aiNet. The training process in aiNet is partly inspired by clonal selection principle and the other part uses antibody interactions for removing redundancy and finding data patterns. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Development of heuristic task scheduling algorithm in cloud computing
Published 2016“…As the immense growth of data have affected many organizations, there have been a need to adopt the cloud resources for processing big data applications which could cost highly by using traditional storage. …”
Get full text
Get full text
Proceeding Paper -
13
Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm
Published 2025“…The results showed that using canopy as a preprocessing step cut the time it proceeds to deal with the significant number of power load abnormalities found in parallel using a fast density peak dataset and the time it proceeds for the k-means algorithm to run. …”
Article -
14
Computational Discovery of Motifs Using Hierarchical Clustering Techniques
Published 2008“…Our algorithm is evaluated using two sets of DNA sequences with comparisons. …”
Get full text
Get full text
Get full text
Proceeding -
15
-
16
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
17
Technical job distribution at BSD SHARP service center using combination of naïve Bayes and K-Nearest neighbour
Published 2022“…Meanwhile, k-NN algorithm is used to classify the experimental data. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
-
19
-
20
Application of Simon encryption algorithm for data transmission between sensor nodes in IoT environment
Published 2024“…The performance metric used to measure the performance are time duration for a complete process and CPU utilization. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper
