Search Results - (( development priority detection algorithm ) OR ( java application optimisation algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- development priority »
- priority detection »
- java application »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
Conflict-free automated guided vehicles routing using multi-objective genetic algorithm
Published 2013“…Numerical experiment was conducted on the developed algorithm.…”
Get full text
Get full text
Get full text
Article -
3
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
4
Simulation and Design of an Intelligent Mobile Robot for Fire Fighting
Published 2003“…More comprehensive study in behaviour coordination will be the major focus to ensure smoother robot navigation and more effective fire detection capability. Keywords: (Fuzzy logic control, mobile robot, part recognition algorithms)…”
Get full text
Get full text
Thesis -
5
An Improved Network Intrusion Detection Method Based On CNN-LSTM-SA
Published 2025“…Network intrusion detection is an essential component of contemporary cybersecurity strategies, and the development of efficient techniques to accurately identify malicious activities has become a priority. …”
Get full text
Get full text
Get full text
Get full text
Article -
6
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…The higher the dissimilarity value, the higher the probability of detecting new faults. Previous research has used Jaccard Distance to measure the distance to prioritize test cases with the same priority value. …”
Get full text
Get full text
Get full text
Article -
7
Depth frame loss concealment for wireless transmission utilising motion detection information
Published 2014“…The proposed method is able to improve the quality of video in comparison with frame copy algorithm. The feasibility and performance of the proposed method based on motion detection error concealment is evaluated analytically by considering different packet and frame loss rates. …”
Get full text
Get full text
Thesis -
8
Student resource exchange: a web-based system for sharing educational resources among students
Published 2025“…In addition, the platform introduces AI-powered study tools, including automated question generation and flashcards, as well as a built-in smart calendar planner that applies conflict detection and priority-based scheduling algorithms to help students manage study sessions and deadlines effectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
9
Evolutionary cost-cognizant regression test case prioritization for object-oriented programs
Published 2019“…Improved rate of faults detection can give developers chance to debug the faulty software earlier. …”
Get full text
Get full text
Thesis -
10
Design and Modelling of an Energy Aware Dynamic Management for Wireless Sensor Node with Dual Harvesters
Published 2020“…To reduce the power consumption while not compromising the integrity of the signal transmission, the sensor node is improved with a novel energy-aware Event-Priority-Driven Dissemination (EPDD) algorithm. It is developed to make the sink station able to detect a missing node within the network. …”
Get full text
Get full text
Get full text
Thesis -
11
Evaluation approach for efficient countermeasure techniques against denial-of-service attack on MPSoC-based IoT using multi-criteria decision-making
Published 2022“…Results: (1) CRITIC weighting shows that MPSoC NoC Routing Algorithm (XY and YX) is the highest weight criterion, whereas latency (clock/cycle) is the less weight criterion. (2) The Fermatean-FDOSM-based group ranking shows that the Collision Point Router Detection (CPRD) countermeasure technique is the first-ranked alternative compared to the Secure Model Checkers (SMCs) approach. (3) The DoS A-CTs priority ranks were subjected to a systematic ranking that was confirmed by solid correlation results throughout thirteen criterion weight values. …”
Get full text
Get full text
Article -
12
Crash Recovery Support For Variable Strength T-Way Test Generation Strategy
Published 2016“…Empirical evidence in the literature indicated that t-way test generation strategy has managed to minimize the test cases significantly whilst maintaining the fault detection capability of the testing process. Much useful progress has been achieved as far as the development of t-way test generation strategy is concerned. …”
Get full text
Get full text
Thesis
