Search Results - (( data validation matching algorithm ) OR ( java application testing algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  3. 3
  4. 4

    New filtering framework for web personalization search / Anitawati Mohd Lokman and Aishah Ahmad by Mohd Lokman, Anitawati, Ahmad, Aishah

    Published 2012
    “…The first survey is for data collection and the second survey is for validation of the filtering framework. …”
    Get full text
    Get full text
    Research Reports
  5. 5

    Fuzzy Systems and Bat Algorithm for Exergy Modeling in a Gas Turbine Generator by Alemu Lemma, Tamiru, Mohd Hashim, Fakhruldin

    Published 2011
    “…The data for model training and validation are generated using semi-empirical models developed by the authors. …”
    Get full text
    Conference or Workshop Item
  6. 6

    Approach For Optimizing Course Recommendation Based On Integrating Modified Felder-Silverman Learning Style Model With Meta-Heuristics Algorithm by Ashraf, Erum

    Published 2023
    “…This research streamlines course selection by matching it with learners' styles. It involves identifying potential courses learning style, validated through genetic and surrogate meta-heuristics optimization algorithms, and employing Felder-Silverman model for learning style identification. …”
    Get full text
    Get full text
    Thesis
  7. 7

    Moving objects detection from UAV captured videos using trajectories of matched regional adjacency graphs by Harandi, Bahareh Kalantar Ghorashi

    Published 2017
    “…Precision and recall are used as the criteria to quantitatively evaluate and validate overall MOD performance. Furthermore, both are computed with respect to the ground-truth data which are manually annotated for the video sequences. …”
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    CONTEXT AWARE TRAFFIC SCHEDULING ALGORITHM FOR COMMUNICATION SYSTEM IN POWER DISTRIBUTION NETWORK by NURSHAZLINA SUHAIMY

    Published 2023
    “…The simulation results from NS-3 is validated with the results obtained from MATLAB. It proves that the contextual aware ranking of each traffic are correctly matched to one another. …”
    text::Thesis
  9. 9

    Implementation of perez-dumortier calibration algorithm by Jedol Dayou, Chang, Jackson Hian Wui, Justin Sentian

    Published 2014
    “…The implementation example uses irradiance-matched technique by i-SMARTS radiative transfer code to derive corresponding reference AOD for validation purposes. …”
    Get full text
    Get full text
    Get full text
    Chapter In Book
  10. 10
  11. 11

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  12. 12

    Sizing algorithm for stand-alone AC coupled Hybrid PV-diesel power system under Malaysian climate / Nor Syafiqah Syahirah Mohamed by Mohamed, Nor Syafiqah Syahirah

    Published 2016
    “…The result of the proposed algorithm is compared and validates with the system data from actual installed PV hybrid system in Sabah based on performance indices specified in Malaysian Standard MS IEC 61724: 2010. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Privacy-preserving multi-keyword hybrid search over encrypted data in cloud by Singh, N., Kumar, J., Singh, A.K., Mohan, A.

    Published 2022
    “…This algorithmic combination is able to predict the privacy ranking measure of the retrieved data. …”
    Get full text
    Get full text
    Article
  14. 14

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  15. 15
  16. 16
  17. 17

    Prediction of football club winning rate using Bayesian model algorithm / Adam Khairul Anuar by Khairul Anuar, Adam

    Published 2023
    “…Recommendations include continuous model training, detailed features, collaboration with experts, and exploring alternative algorithms. In essence, this research contributes to football analytics, offering a reliable Bayesian model for match outcome prediction.…”
    Get full text
    Get full text
    Thesis
  18. 18

    Wifi4U: Broadband recommendation system by using rule-based and cosine similarity / Putri Nur Syarfa Maizan by Maizan, Putri Nur Syarfa

    Published 2020
    “…In this system, Forward Chaining in Rule-Based algorithm is used to filter user’s preferences and Web-Scraping technique is used to extract data and information from websites. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  20. 20