Search Results - (( java application optimisation algorithm ) OR ( java construction cost algorithm ))
Search alternatives:
- application optimisation »
- optimisation algorithm »
- java construction »
- construction cost »
- java application »
- cost algorithm »
-
1
Study and Implementation of Data Mining in Urban Gardening
Published 2019“…The system is essentially a three-part development, utilising Android, Java Servlets, and Arduino platforms to create an optimised and automated urban-gardening system. …”
Get full text
Get full text
Get full text
Article -
2
A cluster-based hybrid replica control protocol for high availability in data grid
Published 2019“…Another proposed algorithm is replica placement algorithm which selects and places only one replica in each cluster. …”
Get full text
Get full text
Thesis -
3
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
4
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…The contributions of this study straddle research perspectives of enhancing Regression Testing with Particle Swarm-Artificial Bee Colony Algorithm, and practical perspectives by providing software testing practitioners the TCP framework that can facilitate and accelerate the production of high-quality software products by revealing faults early and reducing time, cost, and human efforts through automation.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
5
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…Before location estimation, database of location fingerprint is constructed by collecting histograms of RSS at predefined reference locations. …”
Get full text
Get full text
Thesis -
6
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
Published 2021“…In addition, a proof of concept is constructed to validate the proposed multi-factor Kerberos authentication using Java programming language. …”
Get full text
Get full text
Thesis -
7
Constrained clustering approach to aid in remodularisation of object-oriented software systems / Chong Chun Yong
Published 2016“…Ultimately, this research helps in reducing the cost of software maintenance through better comprehension of the recovered software design.…”
Get full text
Get full text
Thesis
