Search Results - (( java application testing algorithm ) OR ( site selection techniques algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  3. 3

    Road condition assessment by OBIA and feature selection techniques using very high-resolution WorldView-2 imagery by Shahi, Kaveh, Mohd Shafri, Helmi Zulhaidi, Hamedianfar, Alireza

    Published 2016
    “…The chi-square algorithm outperformed SVM and RF techniques. The classification result based on CHI algorithm achieved an overall accuracy of 83.19% for the training image (first site). …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan by Muhammad @ Atan, Nurmalessa

    Published 2020
    “…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
    Get full text
    Get full text
    Thesis
  5. 5
  6. 6
  7. 7

    Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed by Borujeni, Sattar Chavoshi

    Published 2012
    “…Three algorithms of Linear (PURELIN), hyperbolic tangent sigmoid (TANSIG) and logistic sigmoid (LOGSIG) activation functions were selected for output layer. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  9. 9

    Optimized techniques for landslide detection and characteristics using LiDAR data by Mezaal, Mustafa Ridha

    Published 2018
    “…The segmentation process was optimized using Fuzzy-based Segmentation Parameter. Also, six techniques: Ant Colony Optimization (ACO), Gain Ratio (GR), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), Random forest (RF), and Correlation-based Feature Selection (CFS) were used for the feature selection. …”
    Get full text
    Get full text
    Get full text
    Thesis
  10. 10

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  11. 11

    A new framework for geospatial site selection using artificial neural networks as decision rules: a Case study on landfill sites by Abujayyab, Sohaib K. M., Ahamad, Mohd Anusi S., Yahya, Ahmad Shukri, H. Y. Saad, Abdul Malik

    Published 2015
    “…A multilayer feed-forward network with a backpropagation algorithm was used to train the networks from prior sites to assess, generalize, and evaluate the outputs on the basis of the inputs for the new sites. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12
  13. 13
  14. 14
  15. 15

    Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing by Hamedianfar, Alireza

    Published 2015
    “…The reproducible and transferable novel models were proposed based on (1) user-defined OBIA rule sets and (2) data mining (DM) techniques. In the first case, the rule sets were manually developed from the first study site and then transferred to the second study site, which had a wider coverage. …”
    Get full text
    Get full text
    Thesis
  16. 16

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  18. 18
  19. 19

    AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm by Salim, Nur Saadah, Saad, Shahadan

    Published 2025
    “…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20