Search Results - (( basic evaluation practices algorithm ) OR ( java implementation during algorithm ))
Search alternatives:
- implementation during »
- evaluation practices »
- java implementation »
- basic evaluation »
- during algorithm »
-
1
Pairwise testing tools based on hill climbing algorithm (PTCA)
Published 2014“…The actual implementation of the algorithm which is in Java programming language, the program is implemented on Net Bean 7.0.1. …”
Get full text
Get full text
Undergraduates Project Papers -
2
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
3
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
CSC562: Information Retrieval and Searching Algorithms / College of Computing, Informatics and Media
Published 2022Get full text
Get full text
Get full text
Teaching Resource -
5
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…The system is capable in operating an off-line programming method, starting from its programming sequences until robotic implementation of the program. During early stages, the research is emphasis more towards designing a robotic system using RoboLab software and C++ programming language. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
6
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
7
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before developing the system, study on characteristics of RSS is conducted to help the design, development and implementation of the proposed system. The proposed system is then designed and developed using Java programming language. …”
Get full text
Get full text
Thesis -
8
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…In point of fact, it is significant to produce a security evaluation of block cipher algorithms to determine a statistical non-random behavior of attacks. …”
Get full text
Get full text
Get full text
Article -
9
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
10
A review of navigation systems (integration and algorithms)
Published 2009Get full text
Get full text
Get full text
Article -
11
Syllable-based Malay Word Stemmer
Published 2014“…The approach shows high practicality as it produces a very high accuracy in the evaluation.…”
Get full text
Get full text
Proceeding -
12
Performance optimization method in OFDM based on majorization and minimization technique
Published 2019“…In this paper, we demonstrate and simulate a practical algorithm to mitigate phase noise which induces ICI .This algorithm is termed as Tight Quadratic Majorization (TQM) and is derived for phase noise estimation. …”
Get full text
Get full text
Get full text
Article -
13
Optimization of Motion Compensated Block-Based DCT Video Compression for Software Implementation
Published 2000“…When such a block was detected, some of the standard processing steps may be skipped and some computation may be saved. The proposed new algorithm was evaluated and the results indicate that it was practical in low bit rate environments targeted by H.263 as no negative speed gain was observed for the full range of step size during the evaluation. …”
Get full text
Get full text
Thesis -
14
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
15
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To prevent overfitting, early stopping is used to monitor validation loss during training and dropout rate of 0.3 are applied. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
An analysis of the AAḃ asymmetric encryption scheme on embedded devices for IoT environment / Syed Farid Syed Adnan
Published 2019“…To date, this research found no known practical implementation of the AAḃ algorithm to prove or to validate its efficiency on a real-world computing platform. …”
Get full text
Get full text
Thesis -
17
Development an accurate and stable range-free localization scheme for anisotropic wireless sensor networks
Published 2022“…The developed localization framework is separately validated and evaluated each optimized step under various evaluation criteria, in terms of accuracy, stability, and cost, etc. …”
Get full text
Get full text
Thesis -
18
Automatic generic process migration system in linux
Published 2012“…A fexible interface to the underlying checkpoint/ restart subsystem is designed which permits users to specify the migration mechanism according to process constraints. A migration algorithm is designed which attempts to exploit the unique features of the basic migration algorithms to form a generic algorithm. …”
Get full text
Get full text
Thesis -
19
Application of hybrid intelligent systems in predicting the unconfined compressive strength of clay material mixed with recycled additive
Published 2021“…Afterward, these models were evaluated according to several well-known performance indices. …”
Get full text
Get full text
Article -
20
Application of hybrid intelligent systems in predicting the unconfined compressive strength of clay material mixed with recycled additive
Published 2021“…Afterward, these models were evaluated according to several well-known performance indices. …”
Get full text
Get full text
Article
