Search Results - (( java evaluation model algorithm ) OR ( based contracting method algorithm ))
Search alternatives:
- contracting method »
- based contracting »
- method algorithm »
- java evaluation »
- model algorithm »
-
1
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The purpose of this project are to construct and provide guidelines to develop a simulation model to evaluate cryptography algorithm in terms of encryption speed and descryption speed on UUM portal. …”
Get full text
Get full text
Get full text
Thesis -
2
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
Get full text
Get full text
Get full text
Thesis -
3
Factor Strategy Model: Proofs of Prototype Concept for Software Quality Evaluation
Published 2010“…The objective of this study is to provide software developers some measures to evaluate software quality of a Java program. Studies on software quality requirements, software quality models (as a quantifying measurement technique) and various good design rules are required for. …”
Get full text
Get full text
Article -
4
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…A Sazonov Engine which is a fuzzy java engine is use to apply Bat Algorithm in the experiment. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
5
Classification of labour pain using electroencephalogram signal based on wavelet method / Sai Chong Yeh
Published 2020“…All in all, this study aims to design, develop, optimize and test the method of pain assessment using the EEG signal during the active contraction phase of the first stage of labour. …”
Get full text
Get full text
Get full text
Thesis -
6
Software metrics selection model for predicting maintainability of object-oriented software using genetic algorithms
Published 2016“…The latest effort to solve this selection problem is the development of the metrics selection model that uses genetic algorithm (GA). However, the process failed to state clearly the encoding strategy in its initial stage. …”
Get full text
Get full text
Thesis -
7
Development of optimization Alghorithm for uncertain non-linear dynamical system
Published 2004“…The new algorithms also boast faster contractions. Both new algorithms performed better than DISOPE. …”
Get full text
Get full text
Monograph -
8
Ethereum blockchain-based three factor authentication and multi-contract access control for secure smart home environment in 5G networks
Published 2025“…To increase security, we perform secure authentication by creating an effective methodology based on the Touch Well before Use (TWU) method which protects against attacks. …”
Article -
9
Hysteresis Modelling of Pneumatic Artificial Muscle using General Cubic Equation and Factor Theorem Prediction Method / Mohd Azuwan Mat Dzahir...[et al.]
Published 2017“…The methodology used to establish the hysteresis modelling and prediction method of the pneumatic artificial muscle are as follows; first is the characterization of the pneumatic artificial muscle at different loads and pressures; second is to develop a prediction method for generating constraint models of hysteresis data at a different loads using general cubic equation and factor theorem; third is to establish a simple theorem or algorithm to extract the hysteresis models (i.e., contraction and expansion) of a pneumatic artificial muscle at different loads based on the generated constraint models; and the final stage of the research is to obtain the hysteresis models at different loads. …”
Get full text
Get full text
Article -
10
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…The simulation will be carried on WEKA tool, which allows us to call some data mining methods under JAVA environment. The proposed model will be tested and evaluated on both NSL-KDD and KDD-CUP 99 using several performance metrics.…”
Get full text
Get full text
Thesis -
11
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against existing grid resource management algorithms such as Antz algorithm, Particle Swarm Optimization algorithm, Space Shared algorithm and Time Shared algorithm, in terms of processing time and resource utilization. …”
Get full text
Get full text
Get full text
Thesis -
12
The development of Muscle Fatigue Prediction model from muscle torque and contraction data / Keshasni Earichappan
Published 2023“…This study starts with the collection of data on muscle contraction(mV) and torque (Nm) based on six healthy subjects doing isokinetic knee extension. …”
Get full text
Get full text
Get full text
Thesis -
13
Landslide Susceptibility Mapping with Stacking Ensemble Machine Learning
Published 2024“…One of the prominent methods to improve machine learning accuracy is by using ensemble method which basically employs multiple base models. In this paper, the stacking ensemble method is used to increase the accuracy of the machine learning model for LSM where the base (first-level) learners use five ML algorithms namely decision tree (DT), k-nearest neighbor (KNN), AdaBoost, extreme gradient boosting (XGB) and random forest (RF). …”
Conference Paper -
14
Development of a new robust hybrid automata algorithm based on surface electromyography (SEMG) signal for instrumented wheelchair control
Published 2020“…This method would be a control method to activate power assist system and selected based on conditions set in the algorithm. …”
Get full text
Get full text
Thesis -
15
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…In the second phase, a classifier ensemble learning model is proposed consisting of separate outputs: (i) To select a relevant subset of original features based on Binary Quantum Gravitational Search Algorithm (QBGSA), (ii) To mine data streams using various data chunks and overcome a failure of single classifiers based on SVM, MLP and K-NN algorithms. …”
Get full text
Get full text
Thesis -
16
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
17
IFS on the multi-fuzzy fractal space.
Published 2009“…This theorem is the fundamental result on which the IFS methods are based and the fractals are built. The defined mappings are proved to satisfy some generalizations of the contraction condition.…”
Get full text
Get full text
Article -
18
Enhancing project completion date prediction using a hybrid model: rule-based algorithm and machine learning algorithm
Published 2025“…The study employs a hybrid predictive model that combines Big Data technologies, Extract Load Transfer (ELT) processes, rule-based algorithms (RBA), machine learning (ML), and Power BI visualizations. …”
Get full text
Get full text
Get full text
Article -
19
Individual And Ensemble Pattern Classification Models Using Enhanced Fuzzy Min-Max Neural Networks
Published 2014“…Firstly is by enhancing the learning algorithm of a neural-fuzzy network; and secondly by devising an ensemble model to combine the predictions from multiple neural-fuzzy networks using an agent-based framework. …”
Get full text
Get full text
Thesis -
20
An enhancement of multi-factor weighted approach technique in prioritizing test cases by comparing similarity distance
Published 2025“…Software testing is one of the most critical phases in the software development life cycle model (SDLC), where the quality of a software product is evaluated. …”
Get full text
Get full text
Get full text
Article
