Search Results - (( variable estimation research algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  3. 3

    Fast adaptive motion estimation search algorithm for H.264 encoder by Patwary, Md Anwarul Kaium

    Published 2012
    “…Simulation result shows that as compared to previous research, this algorithm achieves up to average 60% reduction in motion estimation time without degrading the video quality.…”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Electricity demand forecasting in Turkey and Indonesia using linear and nonlinear models based on real-value genetic algorithm and extended Nelder-Mead local search by Wahab, Musa

    Published 2014
    “…Hybrid genetic algorithm (GA) and Nelder-Mead local search mode 1 has been used to minimize demand estimation errors. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7
  8. 8
  9. 9

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  10. 10

    Bayesian logistic regression model on risk factors of type 2 diabetes mellitus by Chiaka, Emenyonu Sandra

    Published 2016
    “…The coefficients of the variables mentioned above were estimated by the method of maximum likelihood and significant variables were further identified. …”
    Get full text
    Get full text
    Thesis
  11. 11

    Processing time estimation in precision machining industry using AI / Lim Say Li by Lim, Say Li

    Published 2017
    “…Neural Network (NN) model is chosen as the artificial intelligence approach used in this research. Levenberg-Marquardt algorithm is used as the training algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Hybrid fuzzy-sliding mode observer design for estimation and advanced control of an ethylene polymerization process / Jarinah Mohd Ali by Jarinah , Mohd Ali

    Published 2017
    “…Observers are computational algorithms designed to estimate unmeasured state variables due to the lack of appropriate estimating devices or to replace the high-priced sensors in a plant. …”
    Get full text
    Get full text
    Get full text
    Thesis
  13. 13
  14. 14

    Robust variable selection methods for large- scale data in the presence of multicollinearity, autocorrelated errors and outliers by Uraibi, Hassan S.

    Published 2016
    “…The Reweighted Multivariate Normal (RMVN) algorithm is incorporated in the algorithm of the BAE-Net. …”
    Get full text
    Get full text
    Thesis
  15. 15

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  16. 16
  17. 17
  18. 18

    Neighbour-based on-demand routing algorithms for mobile ad hoc networks by Ejmaa, Ali Mohamed E.

    Published 2017
    “…The dropping decision of the redundant RREQ in the NCPR algorithm completely relies on preset variables, such variables require to be set by the system administrator based on the scenario. …”
    Get full text
    Get full text
    Get full text
    Thesis
  19. 19

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  20. 20