Search Results - (( developing function based algorithm ) OR ( java evaluation system algorithm ))
Search alternatives:
- developing function »
- evaluation system »
- system algorithm »
- java evaluation »
-
1
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…To improve the users’ memorability, the upload background picture function and cued colour scheme were proposed for the BPG system; the grid line scaling function and the loose authentication method were proposed for the enhanced BPG system; and the chronological story-based cued recall technique was proposed for the VIP Pro system. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
2
Fuzzy-based multi-agent approach for reliability assessment and improvement of power system protection
Published 2015“…The second agent is a reliability evaluation agent that uses a recursive algorithm to predict the suitability generator based on the frequency and duration reliability indices in each state while the third agent is the storage and transfer of data between the other two agents. …”
Get full text
Get full text
Thesis -
3
Automatic Number Plate Recognition on android platform: With some Java code excerpts
Published 2016“…Hence, the objective of this research is to propose suitable and optimize algorithm for ANPR system on Android mobile phone. …”
Get full text
Get full text
Get full text
Book -
4
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Afterward evolutionary algorithm (EA) was employed to prioritize test cases based on the rate severity of fault detection per unit test cost. …”
Get full text
Get full text
Thesis -
5
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
6
-
7
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
8
Face recognition and identification system (FaceRec) / Khew Jye Huei
Published 2004“…Various experiments are carried out to evaluate the performance of the working system to determine its performance and results. …”
Get full text
Get full text
Thesis -
9
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
A block cipher based on genetic algorithm
Published 2016“…In many algorithms which are based on the genetic algorithm approach, diffusion properties using crossover and mutation function are being generated to produce a secure data transmission. …”
Get full text
Get full text
Get full text
Thesis -
11
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
12
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018Get full text
Get full text
Get full text
Undergraduates Project Papers -
13
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The software metric thresholds were used as indication for identifying unsafe design in software engineering. To evaluate this technique, an experiment was conducted on two geospatial systems developed using Java programming language where the Chidamber and Kemerer (CK) metrics were used. …”
Get full text
Get full text
Thesis -
14
Classroom finder system with student availability, space and time constraint
Published 2024“…The primary focus of the system is on facilitating efficient and conflict-free room assignments while considering various constraints and requirements by exploring the suitable Artificial Intelligence approaches and scheduling algorithms. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Semiparametric inference procedure for the accelarated failure time model with interval-censored data
Published 2019“…The rank-based methods, estimating algorithms, and resampling techniques that are developed do not involve the difficulties of the existing estimating procedures. …”
Get full text
Get full text
Get full text
Thesis -
16
A genetic algorithm based approach for economic dispatch in power system / Mohd Rozely Kalil
Published 1998“…The Genetic Algorithm developed in the project was tested on two objective functions for optimizing the economic dispatch problem, which are the total generation cost and the incremental cost function. …”
Get full text
Get full text
Thesis -
17
Computation of cryptosystem based on Lucas functions using addition chain
Published 2010“…In this paper, an efficient computation algorithm for LUC Cryptosystem is developed. It is based on Addition Chain. …”
Get full text
Get full text
Conference or Workshop Item -
18
A study on regional GDP forecasting analysis based on radial basis function neural network with genetic algorithm (RBFNN-GA) for Shandong economy
Published 2022“…These basic indicators can comprehensively and effectively reflect a country’s or region’s future economic development. The center of radial basis function neural network and smoothing factor to take a uniform distribution of the random radial basis function artificial neural network will be the focus of this study. …”
Get full text
Get full text
Article -
19
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…The performance of CBH protocol is evaluated theoretically and using simulations. A discrete event simulator called GridSim and Java programming language is used to simulate the proposed protocol. …”
Get full text
Get full text
Thesis -
20
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…We simulate our proposed algorithms using a Java based simulator that is purposedly built for Grid computing simulations. …”
Get full text
Get full text
Get full text
Thesis
