Search Results - (( java application during algorithm ) OR ( peer evaluation using algorithm ))
Search alternatives:
- application during »
- java application »
- during algorithm »
- evaluation using »
- peer evaluation »
- using algorithm »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
-
3
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
5
-
6
Assignation of PSM evaluator using genetic algorithm
Published 2012Get full text
Get full text
Undergraduates Project Papers -
7
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
8
Sudoku Generator based on hybrid algorithm / Faridah Abdul Rahman
Published 2012Get full text
Get full text
Thesis -
9
-
10
Evaluation of MLP-ANN Training Algorithms for Modeling Soil Pore-Water Pressure Responses to Rainfall
Published 2013Get full text
Get full text
Citation Index Journal -
11
Objective evaluation of speech enhancement using compressive sensing algorithm
Published 2013Get full text
Get full text
Get full text
Proceeding Paper -
12
-
13
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
14
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013Get full text
Get full text
Article -
15
-
16
-
17
-
18
-
19
Evaluation of a spacecraft attitude and rate estimation algorithm
Published 2010Get full text
Get full text
Get full text
Article -
20
Vector Evaluated Gravitational Search Algorithm (VEGSA) for multi-objective optimization problems
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item
