Search Results - (( variables reduction based algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Minimization of Test Cases and Fault Detection Effectiveness Improvement through Modified Reduction with Selective Redundancy Algorithm by Nikfal, Shima

    Published 2007
    “…Then the algorithm gathers all the test cases based on the definition occurrence and def-use pair if they cover same definition occurrence of one variable but they don’t cover def-use pair of the same variable. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  4. 4

    Imposed weighting factor optimization method for torque ripple reduction of IM fed by indirect matrix converter with predictive control algorithm by Uddin, M., Mekhilef, Saad, Rivera, M., Rodriguez, J.

    Published 2015
    “…This paper proposes a weighting factor optimization method in predictive control algorithm for torque ripple reduction in an induction motor fed by an indirect matrix converter (IMC). …”
    Get full text
    Get full text
    Get full text
    Article
  5. 5

    A firefly algorithm based hybrid method for structural topology optimization by Gebremedhen, H.S., Woldemichael, D.E., Hashim, F.M.

    Published 2020
    “…The lower and upper limit of design variables (0 and 1) were used to find initial material distribution to initialize the firefly algorithm based section of the hybrid algorithm. …”
    Get full text
    Get full text
    Article
  6. 6
  7. 7

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  8. 8

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…Here, the memory consumption can be reduced by enabling a feature selection algorithm that excludes nonrelevant features and preserves the relevant ones. the algorithm is developed based on the variable length of the PSO. …”
    Get full text
    Get full text
    Thesis
  12. 12

    An empirical study of density and distribution functions for ant swarm optimized rough reducts by Pratiwi, Lustiana, Choo, Yun Huoy, Draman @ Muda, Azah Kamilah

    Published 2011
    “…The comparison is based on the experimental result to increase higher fitness value and gain better reducts.…”
    Get full text
    Get full text
    Get full text
    Book Chapter
  13. 13

    Data-based PID control of flexible joint robot using adaptive safe experimentation dynamics algorithm by Mohd Ashraf, Ahmad, Haszuraidah, Ishak, Ahmad Nor Kasruddin, Nasir, Normaniha, Abd Ghani

    Published 2021
    “…This paper proposes the data-based PID controller of flexible joint robot based on adaptive safe experimentation dynamics (ASED) algorithm. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  14. 14

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19

    A Comparative Performance Analysis of Gaussian Distribution Functions in Ant Swarm Optimized Rough Reducts by Pratiwi, Lustiana, Choo, Yun Huoy, Draman @ Muda, Azah Kamilah

    Published 2011
    “…The comparison is based on the experimental result to increase higher fitness value and gain better reducts, which has shown that PDF is better than CDF in terms of generating smaller number of reducts, improved fitness value, lower number of iterations, and higher classification accuracy.…”
    Get full text
    Get full text
    Article
  20. 20

    Enhanced scalar multiplication algorithm over prime field using elliptic net by Muslim, Norliana, Yunos, Faridah, Razali, Zuren, Norddin, Nur Idalisa

    Published 2024
    “…At the field operational level, in comparison to the binary method, the eight-block elliptic net method, and the elliptic net method with ten temporary variables for the 384 bits scenario, the developed scalar multiplication algorithm obtained cost reductions of 57.6%, 31.3%, and 13.2%, respectively. …”
    Get full text
    Get full text
    Get full text
    Article