Search Results - (( java application testing algorithm ) OR ( site selection techniques algorithm ))
Search alternatives:
- selection techniques »
- application testing »
- testing algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
3
Road condition assessment by OBIA and feature selection techniques using very high-resolution WorldView-2 imagery
Published 2016“…The chi-square algorithm outperformed SVM and RF techniques. The classification result based on CHI algorithm achieved an overall accuracy of 83.19% for the training image (first site). …”
Get full text
Get full text
Get full text
Article -
4
Failure detection analysis of grid-connected photovoltaic systems in tropical climate region / Nurmalessa Muhammad @ Atan
Published 2020“…Finally, the verification on the two additional sites of FD algorithm has detected the 'No Fault' and 'Fault' as suggested by the type of failure occurrence and failure identification technique.…”
Get full text
Get full text
Thesis -
5
IMPLEMENTATION OF BEHAVIOUR BASED NAVIGATION IN A PHYSICALLY CONFINED SITE
Published 2017Get full text
Get full text
Final Year Project -
6
-
7
Modeling flood occurences using soft computing technique in southern strip of Caspian Sea Watershed
Published 2012“…Three algorithms of Linear (PURELIN), hyperbolic tangent sigmoid (TANSIG) and logistic sigmoid (LOGSIG) activation functions were selected for output layer. …”
Get full text
Get full text
Thesis -
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Optimized techniques for landslide detection and characteristics using LiDAR data
Published 2018“…The segmentation process was optimized using Fuzzy-based Segmentation Parameter. Also, six techniques: Ant Colony Optimization (ACO), Gain Ratio (GR), Particle Swarm Optimization (PSO) and Genetic Algorithm (GA), Random forest (RF), and Correlation-based Feature Selection (CFS) were used for the feature selection. …”
Get full text
Get full text
Get full text
Thesis -
10
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
11
A new framework for geospatial site selection using artificial neural networks as decision rules: a Case study on landfill sites
Published 2015“…A multilayer feed-forward network with a backpropagation algorithm was used to train the networks from prior sites to assess, generalize, and evaluate the outputs on the basis of the inputs for the new sites. …”
Get full text
Get full text
Get full text
Article -
12
-
13
-
14
-
15
Integration of object-based image analysis and data mining techniques for detailes urban mapping using remote sensing
Published 2015“…The reproducible and transferable novel models were proposed based on (1) user-defined OBIA rule sets and (2) data mining (DM) techniques. In the first case, the rule sets were manually developed from the first study site and then transferred to the second study site, which had a wider coverage. …”
Get full text
Get full text
Thesis -
16
Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun
Published 2000“…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
Get full text
Get full text
Thesis -
17
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
18
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
19
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…This research introduces a new approach to enhancing cybersecurity by integrating Support Vector Machine (SVM) algorithms with penetration testing to develop a recommendation system focused on Cross-Site Scripting (XSS) attack detection. …”
Get full text
Get full text
Get full text
Article -
20
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article
