Search Results - (( java application during algorithm ) OR ( software application based algorithm ))
Search alternatives:
- software application »
- application during »
- application based »
- java application »
- during algorithm »
-
1
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
2
-
3
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
4
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
6
Compiler-based prefetching algorithm for recursive data structure
Published 2007“…Software prefetching has been shown to be effective in reducing memory stalls in array-based applications but not in pointer-based applications. …”
Get full text
Get full text
Get full text
Thesis -
7
An experimental study of neighbourhood based metaheuristic algorithms for test case generation satisfying the modified condition / decision coverage criterion
Published 2018“…In the case when software is being adopted in a mission critical application, failure can lead to loss of life and fortunes. …”
Get full text
Get full text
Thesis -
8
Towards Software Product Lines Optimization Using Evolutionary Algorithms
Published 2019Get full text
Get full text
Proceeding Paper -
9
Cluster Analysis of Data Points using Partitioning and Probabilistic Model-based Algorithms
Published 2014“…This study explores the performance accuracies of partitioning-based algorithms and probabilistic model-based algorithm. …”
Get full text
Get full text
Get full text
Article -
10
Development of New Genetic Algorithm Software for Blow Mould Process
Published 2008Get full text
Get full text
Conference or Workshop Item -
11
-
12
-
13
Test suite generation based on hybrid flower pollination algorithm and hill climbing
Published 2021“…One of the common application of search-based software testing (SBST) is generating test cases for all objectives characterized by a scope model (e.g. articulations, mutants, branches). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The proposed algorithm is able to improve the weaknesses in PQF model in updating and learning the important attributes for software quality assessment. …”
Get full text
Get full text
Get full text
Thesis -
15
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023Subjects:Conference paper -
16
-
17
-
18
Three phase fault algorithm in distribution system by using database approach and impedance based method
Published 2012Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Cohesive token passing algorithm utilizing software agents
Published 2010“…The results acquired validated the improved results of the new software agent based implementation. The performance metrics studied were average delay and average buffer utilization. …”
Get full text
Get full text
Article -
20
Implementation Of FPGA Based Encryption Chip Using VHD - Data Encryption Standard (DES) Algorithm
Published 2006“…Traditional Encryption Algorithms are implemented in software base because of the complexities involved in the operations. …”
Get full text
Get full text
Monograph
