Search Results - (( variable representation based algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- variable representation »
- representation based »
- application testing »
- testing algorithm »
- java application »
-
1
Switching algorithm to avoid attitude representation singularity
Published 2009“…This description may possess computational savings and allow continued use of insightful variables when compared with nonminimal representations such as Euler parameters. …”
Get full text
Get full text
Get full text
Proceeding Paper -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
A review of crossover methods and problem representation of genetic algorithm in recent engineering applications
Published 2020“…Genetic algorithm (GA) is a popular technique of optimization that is bio-inspired and based on Charles Darwin's proposed principles of natural genetics and natural selection theories. …”
Get full text
Get full text
Get full text
Article -
4
Path optimization using genetic algorithm in laser scanning system
Published 2023“…The GA would base on the real-number representation, namely Real-Coded Genetic Algorithm (RCGA). …”
Conference paper -
5
Switching principles to circumvent Euler angle singularity
Published 2010“…This description may possess computational savings and allow continued use of insightful variables when compared with nonminimal representations such as Euler parameters. …”
Get full text
Get full text
Get full text
Proceeding Paper -
6
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
7
Dynamic Bayesian Networks and Variable Length Genetic Algorithm for Dialogue Act Recognition
Published 2007“…In the selection phase, a new variable length genetic algorithm is applied to select the lexical cues. …”
Get full text
Get full text
Thesis -
8
Extremal region detection and selection with fuzzy encoding for food recognition
Published 2019“…Three algorithms were used to accomplish the task of feature representation. …”
Get full text
Get full text
Thesis -
9
Path optimization using genetic algorithm in laser scanning system
Published 2008“…The GA would base on the real-number representation, namely Real-Coded Genetic Algorithm (RCGA). …”
Get full text
Get full text
Conference or Workshop Item -
10
A Comparative Study Of Fuzzy C-Means And K-Means Clustering Techniques
Published 2014“…Then, we apply six datasets to measure the quality of clustering result based on the similarity measure used in the algorithm and its representation of clustering result. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
13
Fault diagnosis by using multi-scale signed directed graph
Published 2022“…It describes and represents the causal relations between the process variables and their effect relations in systems. The conventional SDG fault diagnosis algorithm is a single-scale fault representation origin, and it cannot effectively solve multiple fault representation origins. …”
Get full text
Get full text
Conference or Workshop Item -
14
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
15
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
-
17
-
18
Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End
Published 2012“…The solution obtained from the LB–MILP model, i.e., the decision variables (binary variables), was used to obtain a feasible solution for model UB–NLP. …”
Get full text
Get full text
Final Year Project -
19
Optimization of Upstream Offshore Oilfield Production Planning under Uncertainty and Downstream Crude Oil Scheduling at Refinery Front-End
Published 2009“…The solution obtained from the LB-MILP model, i.e., the decision variables (binary variables), was used to obtain a feasible solution for model UB-NLP. …”
Get full text
Get full text
Final Year Project -
20
Cryptanalysis of elliptic curve scalar multiplication algorithms
Published 2025“…The binary method uses a double-and-add approach, which introduces conditional branches that increase execution variability, making it more vulnerable to timing-based side-channel attacks. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
