Search Results - (( java application model algorithm ) OR ( software migration based algorithm ))
Search alternatives:
- application model »
- java application »
- model algorithm »
- migration based »
-
1
Elitist hybrid migrating birds optimization and genetic algorithm based strategy for T-way test suite generation
Published 2020“…Addressing the aforementioned issues, this research proposes the development and implementation of hybrid t-way strategy based Migrating Birds Optimization Algorithm (MBO) and Genetic Algorithm (GA) with elitism, termed Elitist Hybrid MBO-GA. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
Migrating Birds Optimization based Strategies for Pairwise Testing
Published 2015Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Clustering-based cloud migration strategies
Published 2018“…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
Get full text
Get full text
Article -
6
Clustering-based cloud migration strategies
Published 2018“…The k-means algorithm of the partitioning clustering method is used to analyze cloud migration strategies in this study. …”
Get full text
Get full text
Article -
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
Experimental Model for Teaching Software Testing
Published 2015“…In this paper, we propose the concept of teaching software testing with an experimental model for pairwise testing; developed with Migrating Birds Optimization (MBO) algorithm called Experimental Model for Teaching Software Testing (EMTST). …”
Get full text
Get full text
Get full text
Article -
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
11
FuMAM: fuzzy-based mobile agent migration approach for data gathering in wireless sensor networks
Published 2018“…In this paper, a fuzzy-based MA migration approach (FuMAM) is proposed to determine appropriate itinerary for an MA by considering three parameters: distance, remaining energy, and a number of neighbors. …”
Get full text
Get full text
Get full text
Article -
12
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
13
Hybridmigrating birds algorithm starategy for t-way test suite generation
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
14
-
15
-
16
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
Get full text
Get full text
Final Year Project -
17
Classification model for water quality using machine learning techniques
Published 2015Get full text
Get full text
Article -
18
Experimenting the dendrite cell algorithm for disease outbreak detection model
Published 2014Get full text
Get full text
Get full text
Conference or Workshop Item -
19
Improving oil palm fresh fruit bunch grading system via software and hardware modifications
Published 2016“…This problem is due to the size of the image captured which is 1Gb per image. Therefore, the algorithm was migrated to a standalone software using LabVIEW. …”
Get full text
Get full text
Thesis -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
Get full text
Get full text
Conference or Workshop Item
