Search Results - (( code application during algorithm ) OR ( java evaluation modified algorithm ))
Search alternatives:
- evaluation modified »
- application during »
- code application »
- during algorithm »
- java evaluation »
-
1
A study on channel coding for 5G / Xu Wei
Published 2019Get full text
Get full text
Get full text
Thesis -
2
-
3
-
4
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…This research employed a modified version of the Design Science Research Methodology (DSRM), streamlined into five stages: problem identification, theoretical study, framework development, evaluation, and reporting. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
-
6
Enhanced algorithms for three-dimensional object interpreter
Published 2004Get full text
Get full text
Get full text
Thesis -
7
Development of a scalable video compression algorithm
Published 2012“…It is known that conventional video coding systems encode video content with given bitrates adapted to a specific function or application. …”
Get full text
Get full text
Get full text
Proceeding Paper -
8
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In order to address the challenges that mentioned above in this study, in the first phase, a novel architecture based on ensemble feature selection techniques include Modified Binary Bat Algorithm (NBBA), Binary Quantum Particle Swarm Optimization (QBPSO) Algorithm and Binary Quantum Gravita tional Search Algorithm (QBGSA) is hybridized with the Multi-layer Perceptron (MLP) classifier in order to select relevant feature subsets and improve classification accuracy. …”
Get full text
Get full text
Thesis -
9
-
10
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We utilized the enhanced Q-Learning algorithm to compare actions, including context-based actions, to effectively achieve higher code coverage. …”
Get full text
Get full text
Get full text
Thesis -
11
-
12
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Few approaches have focused on removing the vulnerabilities from the source codes before deployment of the applications. The presence of XSS vulnerabilities in an application makes it easy to attack successfully during runtime. …”
Get full text
Get full text
Thesis -
13
REGION-BASED ADAPTIVE DISTRIBUTED VIDEO CODING CODEC
Published 2011“…The recently developed Distributed Video Coding (DVC) is typically suitable for the applications where the conventional video coding is not feasible because of its inherent high-complexity encoding. …”
Get full text
Get full text
Thesis -
14
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Article -
15
Towards Maximising Hardware Resources and Design Efficiency via High-Speed Implementation of HMAC based on SHA-256 Design
Published 2024“…Some applications, such as Message Authentication Code (MAC), rely on different hashing operations. …”
Get full text
Get full text
Get full text
Get full text
Article -
16
Efficient DNS based Load Balancing for Bursty Web Application Traffic
Published 2012“…Owing to the existing load balancing algorithms still experience server’s resource congestion and slow connection to the system resulted by sudden bursty demand of services especially during special events. …”
Get full text
Get full text
Get full text
Article -
17
Static analysis of Android apps for lifecycle conformance
Published 2017“…This paper presents an automated approach based on static code analysis to aid novice developers in managing system resources during different stages of a mobile application’s lifecycle. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Implementing Station-to-Station protocol using Multi Prime RSA Cryptosystem / Muhammad Arif Musa Abdullah
Published 2023“…The study recommends to use another type of digital signature algorithm to be used in the proposed method. Another recommendation is to modify and optimise the python coding in the study to be more robust and suitable for real world application.…”
Get full text
Get full text
Student Project -
19
Simulation of wheel type fuel grain in hybrid rocket motor
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
20
Pixel Intensity-Based Contrast Algorithm (PICA) for Image Edges Extraction (IEE)
Published 2023Article
