Search Results - (( java application testing algorithm ) OR ( data selection window algorithm ))

Refine Results
  1. 1
  2. 2

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  3. 3

    Comparison of malware detection model using supervised machine learning algorithms / Syamir Mohd Shahirudin by Mohd Shahirudin, Syamir

    Published 2022
    “…The Windows malware dataset has been trained and tested by these three machine learning algorithms to get the percentage detection accuracy. …”
    Get full text
    Get full text
    Student Project
  4. 4

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  5. 5

    The impact of news sentiment on the stock market fluctuation : the case of selected energy sector by Ling, Wu, Siew, Hock Ow

    Published 2021
    “…These findings should provide some guides to stock investors on the movement of the selected stock market prices of energy sector companies during the event window period.…”
    Get full text
    Get full text
    Get full text
    Article
  6. 6

    Fuzzy time series sliding window model for rainfall forecasting / Siti Nor Fathihah Azahari by Azahari, Siti Nor Fathihah

    Published 2017
    “…Rainfall data from four Perlis gauge station are selected and deployed in this study which are taken from Department of Irrigation and Drainage (DID). …”
    Get full text
    Get full text
    Thesis
  7. 7

    Enhanced AI-based anomaly detection method in the intrusion detection system (IDS) / Kayvan Atefi by Atefi, Kayvan

    Published 2019
    “…Experiments demonstrate and prove that the proposed EBPSO method produces better accuracy mining data and selecting subset of relevant features comparing other algorithms. …”
    Get full text
    Get full text
    Thesis
  8. 8

    The Use and Evaluation of Split-Window Techniques for NOAA/AVHRR Surface Temperature Extraction over Different Surface Covers: case study (Perak Tengah & Manjong) area, Malays... by Hassaballa A., Abdul-Haleem, Matori , Abdul Nasir

    Published 2011
    “…The brightness temperature from bands 4&5 was then used with ε to derive Ts using three different split window algorithms. The results showed a good correlation between satellite estimated Ts and measured Ta especially when Uliveri algorithm was applied over the agricultural area with R reaching 87%. …”
    Get full text
    Get full text
    Article
  9. 9

    Mathematical models and optimization algorithms for low-carbon Location-Inventory-Routing Problem with uncertainty by Liu, Lihua

    Published 2024
    “…Further more, an improved non-dominated sorting genetic algorithm with an elite strategy II (IMNSGA-II) has been developed to solve the two bi-objective models, surpassing existing literature’s algorithms such as Pareto Envelope-based Selection Algorithm II (PESA-II) and NSGA-II. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Random subspace K-NN based ensemble classifier for driver fatigue detection utilizing selected EEG channels by Rashid, Mamunur, Mahfuzah, Mustafa, Norizam, Sulaiman, Nor Rul Hasma, Abdullah, Rosdiyana, Samad

    Published 2021
    “…In the present framework, a new channel selection algorithm based on correlation coefficients and an ensemble classifier based on random subspace k-nearest neighbour (k-NN) has been presented to enhance the classification performance of EEG data for driver fatigue detection. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Investigation of evolutionary multi-objective algorithms in solving view selection problem / Seyed Hamid Talebian by Talebian, Seyed Hamid

    Published 2013
    “…In this research, we showed how evolutionary multi-objective algorithms can be used to solve the view selection problem and its advantage over classical optimization problems were described. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  15. 15

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Automatic algorithm applied for calculating thermal conductivity by transient plane source method by Jia, Zhijie, Yang, Liping, Cao, Chengcheng, Li, Huidong, Luo, Caiyun, Tao, Te, Zhong, Qiu, Xu, Zijun, Chen, Zezhong

    Published 2024
    “…Currently, there is no standardized criteria for selecting effective temperature rise data for thermal conductivity calculation. …”
    Get full text
    Get full text
    Get full text
    Article
  17. 17
  18. 18
  19. 19

    Orthogonal Frequency Division Multiple Access resource unit allocation algorithms for IEEE 802.11AX medium access control protocol by Zazali, Azyyati Adiah

    Published 2024
    “…The simulation results demonstrated that the proposed algorithms significantly outperformed the benchmark algorithms across several metrics. …”
    Get full text
    Get full text
    Get full text
    Thesis
  20. 20

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project