Search Results - (( using modification proposed algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- using modification »
- proposed algorithm »
- testing algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection
Published 2022“…The second modification develops a new position update mechanism using the Bat Algorithm movement. …”
Get full text
Get full text
Thesis -
3
A hybrid metaheuristic algorithm for identification of continuous-time Hammerstein systems
Published 2021“…The proposed hybrid method was used for identifying the parameters of linear and nonlinear subsystems in the Hammerstein model using the given input and output data. …”
Get full text
Get full text
Article -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
-
6
Determination of a good indicator for estimated prime factor and its modification in Fermat’s Factoring Algorithm
Published 2021“…Fermat’s Factoring Algorithm (FFA) is an integer factorisation methods factoring the modulus N using exhaustive search. …”
Get full text
Get full text
Get full text
Article -
7
-
8
-
9
New selection algorithm for Mengubah Destini Anak Bangsa (MDAB) students / Zamali Tarmudi ... [et al.]
Published 2014“…Finally, our new proposed algorithm and modification of the variables can derive more precise in terms of representing the actual situation.…”
Get full text
Get full text
Research Reports -
10
Parameter identification of solar cells using improved Archimedes Optimization Algorithm
Published 2023“…Two modifications are made to the original Archimedes Optimization Algorithm (AOA). …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Analysis and Modification of Grain - 128 Stream Cipher Algorithm
Published 2024thesis::master thesis -
12
Image authentication using Zernike moment watermarking
Published 2013“…The results from the test show that the proposed algorithm has good performance in discriminating the malicious from non-malicious modifications which is the main character of an image authentication algorithm. …”
Get full text
Get full text
Thesis -
13
A new variant of black hole algorithm based on multi population and levy flight for clustering problem
Published 2020“…In keeping with this limitation, this study proposes a new variant of BH through two different modifications on the original BH. …”
Get full text
Get full text
Thesis -
14
Detection of multiple outliners in linear regression using nonparametric methods
Published 2004“…Generally, method proposed by Sebert et al. (1998) is based on the use of single linkage clustering algorithm with the Euclidean distances to cluster the points in the plots of standard predicted versus residuals values from a linear regression model. …”
Get full text
Get full text
Monograph -
15
A hybrid of Cuckoo Search and minimization of metabolic adjustment to optimize metabolites production in genome-scale models
Published 2018“…Global optimization algorithms have been widely used for identifying gene knockout strategies. …”
Get full text
Get full text
Indexed Article -
16
Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity
Published 2015“…Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil
Published 2020“…The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
Get full text
Get full text
Thesis -
19
A hybrid residue based sequential encoding mechanism with XGBoost improved ensemble model for identifying 5-hydroxymethylcytosine modifications
Published 2025“…To address this challenge, the paper proposed XGB5hmC, a machine learning algorithm based on a robust gradient boosting algorithm (XGBoost), with different residue based formulation methods to identify 5hmC samples. …”
Article -
20
Enhanced TCPW's Fast Retransmission and Fast Recovery Mechanism over High Bit Errors Networks
Published 2024“…We compared the throughput and congestion window size of the new proposed modifications to TCPW and NewReno. As a result, the proposed algorithm has shown significant improvement over the two implementations.…”
Proceedings Paper
