Search Results - (( java application customization algorithm ) OR ( software evaluation study algorithm ))
Search alternatives:
- customization algorithm »
- java application »
- evaluation study »
-
1
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…The preliminary results show that remarkable studies were reported without considering performance metrics for the purpose of algorithm evaluation. …”
Get full text
Get full text
Article -
2
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…Therefore, FRA using FRT was constructed and the performance of the FRA was evaluated. The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. …”
Get full text
Get full text
Get full text
Thesis -
3
Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation
Published 2010“…The objective of this study is to provide software developers some measures to evaluate software quality of a Java program. …”
Get full text
Get full text
Article -
4
Analysis of tumour control probability, normal tissue complication probability and isotoxic effects for prostate cancer
Published 2016“…Eight prostate treatment plans with Collapsed Cone algorithm were evaluated in term of TCP, NTCP and isotoxic effect using BioSuite and BIOPLAN software. …”
Get full text
Get full text
Monograph -
5
-
6
Text searching algorithm using boyer moore horspool (BMH) algorithm
Published 2015Get full text
Get full text
Undergraduates Project Papers -
7
Cross-project software defect prediction
Published 2022“…In this work, five research questions covering the classification algorithms, dataset, independent variables, performance evaluation metrics used in CPDP studies, and as well as the performance of individual machine learning classification algorithms in predicting software defects across different software projects were addressed accordingly. …”
Get full text
Get full text
Article -
8
-
9
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
10
Chaotic map initializations with Tiki-Taka algorithm for software remodularization problem
Published 2021“…Addressing this issue, this paper evaluates the performance of automated software remodularization using the newly developed Tiki-Taka Algorithm (TTA) and its variants with four chaotic map initializations based on Chebyshev map, Circle map, Logistic Map and Piecewise Map. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
Accuracy assessment of Digital Terrain Model (DTM) Constructed Cloth Simulation Filter (CSF) and Multi Curvature Classification (MCC) algorithm on UAV LiDAR dataset / Mohamad Khair...
Published 2023“…However, challenges arise in processing airborne laser scanning point clouds to generate DTMs, particularly when dealing with different land cover types and slopes. This study aims to evaluate the effectiveness of open-source software algorithms for ground classification in lidar point clouds and the subsequent generation of accurate DTMs. …”
Get full text
Get full text
Student Project -
12
A comparative study on ant-colony algorithm and genetic algorithm for mobile robot planning.
Published 2024“…Focusing on routing optimization, the study evaluates Ant-Colony Optimization (ACO) and Genetic Algorithm (GA) in Mobile Robot Planning. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
13
A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
Published 2010“…In the second step, standard 8th LSB layer embedding has been done for this desired signal. Audio quality evaluation has used to evaluate our purposed method in two ways. …”
Get full text
Get full text
Get full text
Article -
14
An evaluation of feature selection technique for dendrite cell algorithm
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…To understand the magnitude of the task to maintain the software product, software metrics have been used to make quantification based on their respective software features. …”
Get full text
Get full text
Thesis -
16
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…The results from the comparative study and lab experiment give the best algorithm which is guide to design the proposed algorithm. …”
Get full text
Get full text
Get full text
Thesis -
17
Detection on ambiguous software requirements specification written in malay using machine learning
Published 2017“…Four (4) algorithms have been evaluated to find the suitable classification algorithm for this purpose. …”
Get full text
Get full text
Get full text
Thesis -
18
Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis
Published 2017Get full text
Get full text
Thesis -
19
Development of real-time software interface for multicomponent transient signal analysis using Labview and Matlab
Published 2011“…The developed software interface was evaluated with experimental fluorescence data collected from a spectrofluorometer system. …”
Get full text
Get full text
Get full text
Proceeding Paper -
20
Comparative Study between Flower Pollination Algorithm and Cuckoo Search Algorithm for t-way Test Data Generation
Published 2018“…In order to guide software tester (and engineers in general) to select the best algorithm for the problem at hand, there is a need to evaluate and benchmark the performance of each strategy against common case studies. …”
Get full text
Get full text
Get full text
Article
