Search Results - (( using modification proposed algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Enhanced grey wolf optimisation algorithm for feature selection in anomaly detection by Almazini, Hussein

    Published 2022
    “…The second modification develops a new position update mechanism using the Bat Algorithm movement. …”
    Get full text
    Get full text
    Thesis
  3. 3

    A hybrid metaheuristic algorithm for identification of continuous-time Hammerstein systems by Jui, Julakha Jahan, Mohd Ashraf, Ahmad

    Published 2021
    “…The proposed hybrid method was used for identifying the parameters of linear and nonlinear subsystems in the Hammerstein model using the given input and output data. …”
    Get full text
    Get full text
    Article
  4. 4

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9

    New selection algorithm for Mengubah Destini Anak Bangsa (MDAB) students / Zamali Tarmudi ... [et al.] by Tarmudi, Zamali, Saibin, Tammie Christy, Naharu, Nasrah, Ung, Ling Ling

    Published 2014
    “…Finally, our new proposed algorithm and modification of the variables can derive more precise in terms of representing the actual situation.…”
    Get full text
    Get full text
    Research Reports
  10. 10
  11. 11
  12. 12

    Image authentication using Zernike moment watermarking by Shojanazeri, Hamid

    Published 2013
    “…The results from the test show that the proposed algorithm has good performance in discriminating the malicious from non-malicious modifications which is the main character of an image authentication algorithm. …”
    Get full text
    Get full text
    Thesis
  13. 13

    A new variant of black hole algorithm based on multi population and levy flight for clustering problem by Haneen Abdul Wahab, Abdul Raheem

    Published 2020
    “…In keeping with this limitation, this study proposes a new variant of BH through two different modifications on the original BH. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Detection of multiple outliners in linear regression using nonparametric methods by Adnan, Robiah

    Published 2004
    “…Generally, method proposed by Sebert et al. (1998) is based on the use of single linkage clustering algorithm with the Euclidean distances to cluster the points in the plots of standard predicted versus residuals values from a linear regression model. …”
    Get full text
    Get full text
    Monograph
  15. 15
  16. 16

    Software regression test case prioritization for object-oriented programs using genetic algorithm with reduced-fitness severity by Musa, Samaila, Md Sultan, Abu Bakar, Abd Ghani, Abdul Azim, Baharom, Salmi

    Published 2015
    “…Some researchers addressed the issue of test case prioritization using Genetic Algorithm, but the authors do not select modification-revealing before prioritization and used the same fault severity. …”
    Get full text
    Get full text
    Conference or Workshop Item
  17. 17
  18. 18

    Data modification attacks protection using blockchain signing and verification process in bluetooth low energy network / Aiman Nurrasyid Shahrul Kamil by Shahrul Kamil, Aiman Nurrasyid

    Published 2020
    “…The issue of providing end-toend data protection should has been given highest priority by IoT application developer because the data in both private and public networks can be modified and disrupted by attacker. This research proposes some of the blockchain function which is signing and verification process on the BLE (Bluetooth Low Energy) network environment due the security issue on the BLE itself using three different hash algorithm MD5, SHA1 and SHA256. …”
    Get full text
    Get full text
    Thesis
  19. 19

    A hybrid residue based sequential encoding mechanism with XGBoost improved ensemble model for identifying 5-hydroxymethylcytosine modifications by Uddin I., Awan H.H., Khalid M., Khan S., Akbar S., Sarker M.R., Abdolrasol M.G.M., Alghamdi T.A.H.

    Published 2025
    “…To address this challenge, the paper proposed XGB5hmC, a machine learning algorithm based on a robust gradient boosting algorithm (XGBoost), with different residue based formulation methods to identify 5hmC samples. …”
    Article
  20. 20

    Enhanced TCPW's Fast Retransmission and Fast Recovery Mechanism over High Bit Errors Networks by Al-Hasanat, M, Seman, K, Saadan, K

    Published 2024
    “…We compared the throughput and congestion window size of the new proposed modifications to TCPW and NewReno. As a result, the proposed algorithm has shown significant improvement over the two implementations.…”
    Proceedings Paper