Search Results - (( java application model algorithm ) OR ( software evaluation methods algorithm ))
Search alternatives:
- evaluation methods »
- application model »
- methods algorithm »
- java application »
- model algorithm »
-
1
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
2
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
-
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
6
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
7
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
8
A novel embedding method to increase capacity and robustness of low-bit encoding audio steganography technique using noise gate software logic algorithm
Published 2010“…In the second step, standard 8th LSB layer embedding has been done for this desired signal. Audio quality evaluation has used to evaluate our purposed method in two ways. …”
Get full text
Get full text
Get full text
Article -
9
-
10
-
11
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
12
Reversible Watermarking Based on Sorting Prediction Algorithm
Published 2015Get full text
Get full text
Get full text
Article -
13
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item -
14
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
15
Implementation Of Hardware Software Partitioning In Embedded System
Published 2018“…In this paper, the heuristic method is used to evaluate the performance of PSO and GA algorithm in term of to achieve a best cost, total area and total execution time. …”
Get full text
Get full text
Monograph -
16
Software defect prediction framework based on hybrid metaheuristic optimization methods
Published 2015“…The classification algorithm is a popular machine learning approach for software defect prediction. …”
Get full text
Get full text
Get full text
Thesis -
17
LEMABE: a novel framework to Improve analogy-based software cost estimation using learnable evolution model
Published 2021“…Then, MMRE, PRED (0.25), and MdMRE criteria have been used to evaluate and compare the proposed method against other evolutionary algorithms. …”
Get full text
Get full text
Article -
18
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Subjects:Conference paper -
19
Data depublication using : Hashing algorithm / Naimah Nayan
Published 2019“…The objective of this project is to compare MD5 & SHA-1 algorithm in data deduplication technique and to evaluate the MD5 & SHA-1 algorithm, length of message digest and speed using deduplication software. …”
Get full text
Get full text
Thesis -
20
Experimental Model for Teaching Software Testing
Published 2015“…The topic of software testing in education has become appealing to some although most researchers focused on researching software testing tools and methods. …”
Get full text
Get full text
Get full text
Article
