Search Results - (( parameter evaluation case algorithm ) OR ( java application system algorithm ))
Search alternatives:
- parameter evaluation »
- java application »
- system algorithm »
- evaluation case »
- case algorithm »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
-
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
-
5
Real-time algorithmic music composition application.
Published 2022“…In addition, the system also utilises JavaFx and jFugue for its graphical user interface and music programming respectively. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
T-way testing : a test case generator based on melody search algorithm
Published 2015“…Next, TTT-MS will be executed through main algorithms to generate Parameters Interaction List, Parameter Values Interaction List, and finally generate final Test Cases based on Melody Search Algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
7
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
8
-
9
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
10
-
11
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
12
Hybrid Artificial Bees Colony Algorithms For Optimizing Carbon Nanotubes Characteristics
Published 2018“…Chemical Vapor Deposition (CVD) is the most efficient method for CNTs production.However,using CVD method encounters crucial issues such as customization,time and cost.Therefore,Response Surface Methodology (RSM) is proposed for modeling and the ABC-βHC is proposed for optimization purpose to address such issues.The selected CNTs characteristics are CNTs yield and quality represented by the ratio of the relative intensity of the D and G-bands (ID/IG).Six case studies are generated from collected dataset including four cases of CNTs yield and one case of ID/IG as single objective optimization problems,while the sixth case represents multi-objective problem.The input parameters of each case are a subset from the set of input parameters including reaction temperature,duration,carbon dioxide flow rate,methane partial pressure,catalyst loading,polymer weight and catalyst weight.The models for the first three case studies were mentioned in the original work.RSM is proposed to develop polynomial models for the output responses in the other three cases and to identi significant process parameters and interactions that could affect the CNTs output responses.The developed models are validated using t-test,correlation and pattern matching.The predictive results have a good agreement with the actual experimental data.The models are used as objective functions in optimization techniques.For multi-objective optimization,this study proposes Desirability Function Approach (DFA) to be integrated with other proposed algorithms to form hybrid techniques namely RSM-DFA,ABC-DFA and ABC-βHC-DFA.The proposed algorithms and other selected well-known algorithms are evaluated and compared on their CNTs yield and quality.The optimization results reveal that ABC-βHC and ABC-βHC-DFA obtained significant results in terms of success rate,required time,iterations,and function evaluations number compared to other well-known algorithms.Significantly,the optimization results from this study are better than the results from the original work of the collected dataset.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
Hyperdize Jaya Algorithm for Harmony Search Algorithm's Parameters Selection
Published 2016“…This paper present a successful method to tune the parameters of the harmony search algorithm, which is a well-known meta-heuristic algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
15
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
16
A Preliminary Study on Camera Auto Calibration Problem Using Bat Algorithm
Published 2013“…This paper attempts to implement a stochastic optimization algorithm called Bat Algorithm in order to find optimal values of the intrinsic parameters. …”
Get full text
Get full text
Conference or Workshop Item -
17
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The system is developed using Java 2 Micro Edition (J2ME) which is written in Java. …”
Get full text
Get full text
Conference or Workshop Item -
18
A study on the parameter selection of bat algorithm in in optimizing parameters in camera auto calibration problem
Published 2022“…By studying the echolocation behavior of the microbats, the bats will try to improve the fitness with each iteration. The Bat Algorithm's performance is evaluated using a case study from a database from Le2i Universite de Bourgoune. …”
Get full text
Get full text
Get full text
Article -
19
-
20
Using algorithmic taxonomy to evaluate lecture workload: a case study of services application prototype in the UPM KM Portal
Published 2006Get full text
Get full text
Conference or Workshop Item
