Search Results - (( development priority detection algorithm ) OR ( java application customization algorithm ))
Search alternatives:
- customization algorithm »
- development priority »
- priority detection »
- java application »
-
1
Conflict-free automated guided vehicles routing using multi-objective genetic algorithm
Published 2013“…Numerical experiment was conducted on the developed algorithm.…”
Get full text
Get full text
Get full text
Article -
2
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…More comprehensive study in behaviour coordination will be the major focus to ensure smoother robot navigation and more effective fire detection capability. Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
Get full text
Get full text
Thesis -
3
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…Network intrusion detection is an essential component of contemporary cybersecurity strategies, and the development of efficient techniques to accurately identify malicious activities has become a priority. …”
Get full text
Get full text
Get full text
Get full text
Article -
4
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…The higher the dissimilarity value, the higher the probability of detecting new faults. Previous research has used Jaccard Distance to measure the distance to prioritize test cases with the same priority value. …”
Get full text
Get full text
Get full text
Article -
5
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
6
Depth frame loss concealment for wireless transmission utilising motion detection information
Published 2014“…The proposed method is able to improve the quality of video in comparison with frame copy algorithm. The feasibility and performance of the proposed method based on motion detection error concealment is evaluated analytically by considering different packet and frame loss rates. …”
Get full text
Get full text
Thesis -
7
Student resource exchange: a web-based system for sharing educational resources among students
Published 2025“…In addition, the platform introduces AI-powered study tools, including automated question generation and flashcards, as well as a built-in smart calendar planner that applies conflict detection and priority-based scheduling algorithms to help students manage study sessions and deadlines effectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Improved rate of faults detection can give developers chance to debug the faulty software earlier. …”
Get full text
Get full text
Thesis -
9
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
10
Design and Modelling of an Energy Aware Dynamic Management for Wireless Sensor Node with Dual Harvesters
Published 2020“…To reduce the power consumption while not compromising the integrity of the signal transmission, the sensor node is improved with a novel energy-aware Event-Priority-Driven Dissemination (EPDD) algorithm. It is developed to make the sink station able to detect a missing node within the network. …”
Get full text
Get full text
Get full text
Thesis -
11
Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making
Published 2022“…Results: (1) CRITIC weighting shows that MPSoC NoC Routing Algorithm (XY and YX) is the highest weight criterion, whereas latency (clock/cycle) is the less weight criterion. (2) The Fermatean-FDOSM-based group ranking shows that the Collision Point Router Detection (CPRD) countermeasure technique is the first-ranked alternative compared to the Secure Model Checkers (SMCs) approach. (3) The DoS A-CTs priority ranks were subjected to a systematic ranking that was confirmed by solid correlation results throughout thirteen criterion weight values. …”
Get full text
Get full text
Article -
12
Crash Recovery Support For Variable Strength T-Way Test Generation Strategy
Published 2016“…Empirical evidence in the literature indicated that t-way test generation strategy has managed to minimize the test cases significantly whilst maintaining the fault detection capability of the testing process. Much useful progress has been achieved as far as the development of t-way test generation strategy is concerned. …”
Get full text
Get full text
Thesis
