Search Results - (( _ application tools algorithm ) OR ( some application testing algorithm ))*
Search alternatives:
- application testing »
- application tools »
- testing algorithm »
- some application »
- tools algorithm »
-
1
Web based clustering tool using K-MEAN++ algorithm / Muhammad Nur Syazwanie Aznan
Published 2019“…Although the tool has some limitation, but this tool are successfully tested with this two data and manage to calculate and shows the cluster with silhouette score. …”
Get full text
Get full text
Thesis -
2
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…Lastly, on the Testing phase two type of data has been used to test this web tool result. …”
Get full text
Get full text
Thesis -
3
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
ANALYSIS AND INTERPRETATION OF PRESSURE TRANSIENT TEST DATA BY RECENT ROBUST DECONVOLUTION METHODS
Published 2013Get full text
Get full text
Final Year Project -
5
-
6
Modeling And Control Of V-Groove Rotary Impact Driver
Published 2020“…Rotary-impact screw driver which is categorized as hand-held cordless power tool raised the opportunities of use in many applications. …”
Get full text
Get full text
Thesis -
7
Comparative study of meta-heuristics optimization algorithm using benchmark function
Published 2017“…Despite of the good performance, there is limitation in some algorithms that deteriorates by certain degree of problem type. …”
Get full text
Get full text
Article -
8
Identification of non-linear dynamic systems using fuzzy system with constrained membership functions
Published 2004“…Main research directions in this field include the complexity reduction of fuzzy models models, structure identification of fuzzy system, and application of new or improved training algorithms. …”
Get full text
Get full text
Get full text
Thesis -
9
An enhanced color image encryption algorithm using LT-PRNG
Published 2018“…Several chaos-based image encryption algorithms use low-dimension chaos as the encryption tools. …”
Get full text
Get full text
Thesis -
10
-
11
-
12
-
13
-
14
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. …”
Get full text
Get full text
Thesis -
15
An approximation approach for free space wave propagation
Published 2009“…In this paper, we propose a new algorithm with high order characteristic. The efficiency of the new algorithm is tested and compared with the efficiency of high order FDTD method by some numerical experiment. …”
Get full text
Get full text
Conference or Workshop Item -
16
A new mobile malware classification for call log exploitation
Published 2024Subjects:journal::journal article -
17
-
18
Benchmarking of Bat-inspired Interaction Testing Strategy
Published 2016Get full text
Get full text
Get full text
Article -
19
-
20
