Search Results - (( code application tools algorithm ) OR ( java applications modified algorithm ))
Search alternatives:
- applications modified »
- application tools »
- java applications »
- code application »
- tools algorithm »
-
1
Chain code algorithm in deriving T-Junction and region of a freehand sketch
Published 2004“…This paper focuses on the line drawing interpretation by utilising closed loop chain code algorithm as a tool in deriving two geometric entities, i.e. …”
Get full text
Get full text
Get full text
Article -
2
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
3
-
4
-
5
Enhanced Q-Learning algorithm for potential actions selection in automated graphical user interface testing
Published 2023“…We enhanced the Q-Learning algorithm for action selection based on potential action abilities and proposed a tool, namely CrashDroid, that allows the automation of testing context-aware Android applications. …”
Get full text
Get full text
Get full text
Thesis -
6
Improving the exploration strategy of an automated android GUI testing tool based on the Q-Learning algorithm by selecting potential actions
Published 2022“…We propose a tool, namely the Crash Droid, that allows the automation of testing context-aware Android applications. …”
Get full text
Get full text
Article -
7
'Chapter 7: Smartphone penetration test: Securing Industry 5.0 mobile applications' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 Technology, Tools, and Al...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
8
-
9
-
10
'Chapter 10: 5G-enabled IoT applications in healthcare: Transforming the Industry 5.0 healthcare landscape' in "1st Edition, The Future of Human-Computer Integration Industry 5.0 T...
Published 2024“…The Future of Human-Computer Integration: Industry 5.0 Technology, Tools, and Algorithms provides a valuable insight into how Industry 5.0 technologies, tools, and algorithms can revolutionise industries and drive innovation. …”
Get full text
Get full text
Get full text
Book Chapter -
11
Framework of Multi-Microcontroller Evaluation Tool for a use of Academic Environment
Published 2012“…The stress is given to the use of assembly code and high-level tools, where the algorithms are described in the form of different graphical notations, i.e. block diagrams. …”
Get full text
Get full text
Get full text
Article -
12
Multilayers fast mode decision algorithm for scalable video coding: design, implementation, and streaming evaluation on IEEE 802.11g wireless LAN
Published 2011“…The advancement and development in video coding technology, together with the increase of storage capacity network infrastructures and computing power are enabling an increasing number of video applications. …”
Get full text
Get full text
Book -
13
Framework of Designing Multiple Microcontroller Based Applications
Published 2011“…The stress is given to the use of assembly code and high-level tools, where the algorithms are described in the form of different graphical notations, i.e. block diagrams. …”
Get full text
Get full text
Conference or Workshop Item -
14
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
15
-
16
-
17
Intelligent energy systems using the barnacles mating optimizer and evolutionary mating algorithm: Foundations, methods, and applications
Published 2026“…Part II drills deeper into examples, case studies, and applications for energy systems, offering comparative analysis with alternative tools, and providing complimentary MATLAB code using the latest Toolbox. …”
Get full text
Get full text
Get full text
Book -
18
RISC-V instruction set extension on blockchain application
Published 2024Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
20
Design Of FPGA-Based Encryption Chipusing Blowfish Algorithm
Published 2006Get full text
Get full text
Monograph
