Search Results - (( java application testing algorithm ) OR ( structured solution learning algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application by Yana Aditia, Gerhana, Nur, Lukman, Arief Fatchul, Huda, Cecep Nurul, Alam, Undang, Syaripudin, Devi, Novitasari

    Published 2020
    “…Performance Testing is used to test the performance of algorithm implementations in applications. …”
    Get full text
    Get full text
    Journal
  3. 3

    Binary ant colony optimization algorithm in learning random satisfiability logic for discrete hopfield neural network by Gao, Yuan, Mohd Kasihmuddin, Mohd Shareduwan, Chen, Ju, Zheng, Chengfeng, Romli, Nurul Atiqah, Mansor, Mohd. Asyraf, Zamri, Nur Ezlin

    Published 2024
    “…It aimed to optimize the performance of G-type random high-order satisfiability logic structures embedded in Discrete Hopfield Neural Networks, thereby enhancing the efficiency of the Hopfield Neural Network learning algorithm. …”
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Concrete surface inspection by using Unmanned Aerial Vehicle (UAVs) and deep learning algorithms Yolov7 by Rusdinaidi, Saffa Nasuha, Hashim, Khairil Afendy, Ahmad Dahlan, Zaki

    Published 2024
    “…This research aims to evaluate the detection and analysis of cracks on concrete surfaces by utilizing Uavs and Yolo algorithms. Uavs offers a versatile and cost-effective solution for capturing high-resolution orthophotos of large and hard-to-reach concrete structures. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5
  6. 6

    Implementation of (AES) Advanced Encryption Standard algorithm in communication application by Moh, Heng Huong

    Published 2014
    “…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  7. 7
  8. 8

    Concrete surface inspection by using unmanned aerial vehicle (UAV) and deep learning algorithms YOLOv7 / Saffa Nasuha Rusdinadi by Rusdinadi, Saffa Nasuha

    Published 2024
    “…This research aims to improve the detection and analysis of cracks on concrete surfaces by utilizing UAVs and yolo algorithms. Uavs offer a versatile and cost-effective solution for capturing high-resolution orthophotos of large and hard-to-reach concrete structures. …”
    Get full text
    Get full text
    Student Project
  9. 9

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  10. 10

    An improved artificial bee colony algorithm for training multilayer perceptron in time series prediction by Shah, Habib

    Published 2014
    “…Backpropagation (BP) learning algorithm is the well-known learning technique that trained ANN. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13

    Hyper-heuristic approaches for data stream-based iIntrusion detection in the Internet of Things by Hadi, Ahmed Adnan

    Published 2022
    “…In addition, it is considered that existing solutions do not provide a feature driftaware solution to the concept drift adaptable solution, which exploits the fact that many of the original features are non-relevant. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli by Zulkifli, Nur Rasyiqah

    Published 2019
    “…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
    Get full text
    Get full text
    Student Project
  15. 15

    Intelligent cooperative web caching policies for media objects based on J48 decision tree and naïve Bayes supervised machine learning algorithms in structured peer-to-peer systems by Ibrahim, Hamidah, Mohammed, Waheed Yasin, Udzir, Nur Izura, Abdul Hamid, Nor Asilah Wati

    Published 2016
    “…In this work, intelligent cooperative web caching approaches based on J48 decision tree and Naïve Bayes (NB) supervised machine learning algorithms are presented. The proposed approaches take the advantages of structured peer-to-peer systems where the contents of peers’ caches are shared using Distributed Hash Table (DHT) in order to enhance the performance of the web caching policy. …”
    Get full text
    Get full text
    Get full text
    Article
  16. 16
  17. 17

    Problem Solving by Yahaya, Azizi

    Published 2010
    “…Additionally in solving ill-structured problems, people may need to use more than a heuristic or an algorithmic strategy; insight may be required. …”
    Get full text
    Get full text
    Article
  18. 18

    Parse tree visualization for Malay sentence (BMTutor) by Muhamad Noor, Yusnita, Jamaludin, Zulikha

    Published 2015
    “…In Malaysia, various efforts have been made by the government and language researchers in improving student’s ability of mastering Malay language (BM) due to their poor ability in grammar and sentence structure. In terms of technology, to date, there is no computer software or a prototype that is available that can help students in learning the BM sentence structure.Thus, BMTutor is introduced as a solution to this problem. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20

    A Study On AI-Driven Solutions for Cloud Security Platform by Menaga, Segar, Mohamad Fadli, Zolkipli

    Published 2024
    “…Finally, this research seeks to help organizations protect cloud structures and resources using intentioned AI solutions.…”
    Get full text
    Get full text
    Get full text
    Get full text
    Article