Search Results - (( java application testing algorithm ) OR ( changes evaluation learning algorithm ))
Search alternatives:
- application testing »
- evaluation learning »
- learning algorithm »
- testing algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
3
Comparison between Lamarckian Evolution and Baldwin Evolution of neural network
Published 2006“…Hybrid genetic algorithms are the combination of learning algorithms(Back propagation), usually working as evaluation functions, and genetic algorithms. …”
Get full text
Get full text
Get full text
Article -
4
Postsurgery classification of best-corrected visual acuity changes based on Pterygium Characteristics using the Machine Learning Technique
Published 2021“…Conclusion. Machine learning algorithms can produce a highly accurate postsurgery classification model of BCVA changes using pterygium characteristics.…”
Get full text
Get full text
Get full text
Get full text
Article -
5
-
6
Comparison of machine learning algorithms for estimating mangrove age using sentinel 2A at Pulau Tuba, Kedah, Malaysia / Fareena Faris Francis Singaram
Published 2021“…The supervised machine learning algorithm, SVM and Decision Tree are used for the estimation of the mangrove age into young and mature. …”
Get full text
Get full text
Thesis -
7
Advanced machine learning algorithm to predict the implication of climate change on groundwater level for protecting aquifer from depletion
Published 2025“…Ultimately, the results obtained in this study serve as a great benchmark for future GWL prediction using LSTM and XGBoost algorithm and give an insight into the influence of climate change on future GWL. …”
Article -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Machine Learning Algorithm for Malware Detection: Taxonomy, Current Challenges, and Future Directions
Published 2024“…Furthermore, the taxonomy was used to evaluate the most recent machine learning algorithm and analysis. …”
Article -
10
-
11
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
-
15
Extreme learning machine classification of file clusters for evaluating content-based feature vectors
Published 2018“…The methods are Byte Frequency Distribution, Entropy, and Rate of Change. Consequently, an Extreme Learning Machine (ELM) neural network algorithm is used to evaluate the performance of the three methods in which it classifies the class label of the feature vectors to JPEG and Non-JPEG images for files in different file formats. …”
Get full text
Article -
16
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
17
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
18
Classification of JPEG files by using extreme learning machine
Published 2018“…The algorithm automatically classifies the files based on evaluation measures of three methods Entropy, Byte Frequency Distribution and Rate of Change. …”
Get full text
Get full text
Article -
19
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
20
