Search Results - (( using mean parallel algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    Parallel power load abnormalities detection using fast density peak clustering with a hybrid canopy-K-means algorithm by Al-Jumaili A.H.A., Muniyandi R.C., Hasan M.K., Singh M.J., Paw J.K.S., Al-Jumaily A.

    Published 2025
    “…The results showed that using canopy as a preprocessing step cut the time it proceeds to deal with the significant number of power load abnormalities found in parallel using a fast density peak dataset and the time it proceeds for the k-means algorithm to run. …”
    Article
  2. 2
  3. 3

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  4. 4

    Implementation of Parallel K-Means Algorithm to Estimate Adhesion Failure in Warm Mix Asphalt by Akhtar, M.N., Ahmed, W., Kakar, M.R., Bakar, E.A., Othman, A.R., Bueno, M.

    Published 2020
    “…The results showed that the PKIP algorithm decreases the execution time up to 30 to 46 if compared with the sequential k means algorithm when implemented using multiprocessing and distributed computing. …”
    Get full text
    Get full text
    Article
  5. 5

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  6. 6

    Drone Based Image Processing For Precision Agriculture by Sharif, Muhammad Arif Syafiq Md

    Published 2019
    “…At first, the parallel K-means clustering algorithm was applied on the acquired image to segregate various components acquired using UAV. …”
    Get full text
    Get full text
    Monograph
  7. 7

    Application of intelligence based genetic algorithm for job sequencing problem on parallel mixed-model assembly line by Noroziroshan, Alireza, Mohd Ariffin, Mohd Khairol Anuar, Ismail, Napsiah

    Published 2010
    “…Then, it started to find the best sequence of jobs for each line based on the generated population by heuristic algorithm. By this means, intelligence based genetic algorithm only concentrated on those initial populations that produce better solutions instead of probing the entire search space. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    One-dimensional finite element discretization of crack propagation through parallel computation by Islam, Md. Rajibul, Alias, Norma

    Published 2010
    “…Parallel Virtual Machine (PVM) has been used as a message passing software with Parallel Computer System. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…This paper proposed the NAGE method as a straight forward transformation from sequential to parallel algorithm using domain decomposition and splitting strategies. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  10. 10

    Empirical analysis of parallel-NARX recurrent network for long-term chaotic financial forecasting by Abdulkadir, S.J., Yong, S.-P.

    Published 2014
    “…This paper presents an empirical long term chaotic financial forecasting approach using Parallel non-linear auto-regressive with exogenous input (P-NARX) network trained with Bayesian regulation algorithm. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11
  12. 12

    Autonomous anomaly detection using density-based features in streaming data / Muhammmad Yunus Iqbal Basheer by Iqbal Basheer, Muhammmad Yunus

    Published 2023
    “…The performance tests are also conducted to assess whether each algorithm can detect most of the true anomalies. The data is supplied using IoT devices, and benchmark datasets are also presented to test the algorithm's performance.…”
    Get full text
    Get full text
    Thesis
  13. 13

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  14. 14

    Online system identification development based on recursive weighted least square neural networks of nonlinear hammerstein and wiener models. by Kwad, Ayad Mahmood

    Published 2022
    “…The proposed method aimed to obtain a maximally informative mathematical model that can describe the actual dynamic behaviors of a system, using the DC motor as a case study. The goodness of fit validation based on the normalized root-mean-square error (NRMSE) and normalized mean square error, and Theil’s inequality coefficient are used to evaluate the performance of models. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    An efficient indexing and retrieval of iris biometrics data using hybrid transform and firefly based K-means algorithm title by Khalaf, Emad Taha

    Published 2019
    “…The enhanced method combines three transformation methods for analyzing the iris image and extracting its local features. It uses a weighted K-means clustering algorithm based on the improved FA to optimize the initial clustering centers of K-means algorithm, known as Weighted K-means clustering-Improved Firefly Algorithm (WKIFA). …”
    Get full text
    Get full text
    Thesis
  16. 16

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Digital quadrature compensators scheme for analog imperfections of quadrature modulator in wireless communication systems by Talebpour, Faraz

    Published 2016
    “…Adaptive algorithms used to estimate the QM’s imperfections, operate either in online or offline mode. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project