Search Results - (( same location based algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- same location »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
3
Harmony search algorithm for curriculum-based course timetabling problem
Published 2013“…With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
Get full text
Get full text
Get full text
Article -
4
Harmony search algorithm for curriculum-based course timetabling problem
Published 2013“…However, the algorithm produced results that were not comparatively better than those previously known as best solution.With proper modification in terms of the approach in this algorithm would make the algorithm perform better on curriculum-based course timetabling.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
New Algorithm of Location Model based on Robust Estimators and Smoothing Approach
Published 2017Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Optimization of image mapping & camera coverage efficiency for continuous location and tracking
Published 2023“…The Vision Based location and tracking is a vastly escalating technology mainly used to monitor various environments. …”
Conference paper -
7
-
8
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
9
Design of wavelet neural networks based on symmetry fuzzy C-means for function approximation
Published 2013“…In this paper, an enhanced fuzzy C-means algorithm, specifically the modified point symmetry–based fuzzy C-means algorithm (MPSDFCM), was proposed, in order to determine the optimal initial locations for the translation vectors. …”
Get full text
Get full text
Get full text
Article -
10
Wifi fingerprinting indoor positioning with multiple access points in a single base station using probabilistic method
Published 2017“…Based on experimental results, the proposed multiple APs in a single base station was found to reduce the number of base stations required to achieve the same or better accuracy as existing approach using the same number of APs. …”
Get full text
Get full text
Article -
11
Experimental studies on impact damage location in composite aerospace structures using genetic algorithms and neural networks
Published 2010“…This paper compares two advanced signal processing methods for impact location in composite aircraft structures. The first method is based on a modified triangulation procedure and Genetic Algorithms whereas the second technique applies Artificial Neural Networks. …”
Get full text
Get full text
Get full text
Article -
12
Classification System for Heart Disease Using Bayesian Classifier
Published 2007“…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Balancing exploration and exploitation in ACS algorithms for data clustering
Published 2019“…The ACOC performs clustering based on random initial centroids, which are generated iteratively during the algorithm run. …”
Get full text
Get full text
Get full text
Article -
16
Privacy-aware personal navigation services / Melissa Shahrom
Published 2013“…Therefore, protecting the confidentiality of location privacy is extremely vital. This innovation produces an algorithm that is able to protect location privacy and at the same time generate robust navigation instructions without depending on precise location information. …”
Get full text
Get full text
Book Section -
17
WIFI FINGERPRINTING INDOOR POSITIONING WITH MULTIPLE ACCESS-POINTS IN A SINGLE BASE STATION USING PROBABILISTIC METHOD
Published 2017“…Based on experimental results, the proposed multiple APs in a single base station was found to reduce the number of base stations required to achieve the same or better accuracy as existing approach using the same number of APs. …”
Get full text
Get full text
Thesis -
18
Encrypted mobile messaging application using AES block cipher cryptography algorithm / Nur Rasyiqah Zulkifli
Published 2019“…The programming language that is used to write the program is Java Language that will run on android phones. As the result, this project was tested on the functionality of the mobile messaging application. …”
Get full text
Get full text
Student Project -
19
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
20
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article
