Search Results - (( java application bees algorithm ) OR ( java transformational system algorithm ))
Search alternatives:
- transformational system »
- java transformational »
- java application »
- application bees »
- system algorithm »
- bees algorithm »
-
1
Security Analysis Between Static And Dynamic S-boxes In Block Ciphers
Published 2024Get full text
Article -
2
Biometric identification with limited data set
Published 2019Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
3
JTAGGER
Published 2006“…In this project, rule-based tagging algorithm is used as the mechanism to develop the system which named JTagger. …”
Get full text
Get full text
Final Year Project -
4
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…Second approach is renaming system keywords to Unicode to increase difficulty and complexity of the code. …”
Get full text
Get full text
Thesis -
5
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
6
Tacit knowledge for business intelligence framework using cognitive-based approach
Published 2022“…The framework was tested on 23 librarians from several university libraries in West Java and Yogyakarta, Indonesia. The algorithm starts with a content targeted interview to identify the list of problems faced by librarians. …”
Get full text
Get full text
Thesis -
7
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…This research follows an empirical research methodology, where the proposed approach is validated using 40 object-oriented open-source software systems written in Java. Using MoJoFM, which is a well-established technique used to compare the similarity between multiple clustering results, the proposed approach achieves an aggregated average of 80.33% accuracy when compared against the original package diagrams of the 40 software systems, thus considerably outperforms conventional unconstrained clustering approach. …”
Get full text
Get full text
Thesis -
8
