Search Results - (( re evaluation using algorithm ) OR ( java application using algorithm ))
Search alternatives:
- evaluation using »
- java application »
- using algorithm »
- re evaluation »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…The experiment contains two phases; first phase was conducted against java applications that do not use any protection to determine the ability of reversing tools to read the compiled code. …”
Get full text
Get full text
Thesis -
2
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
3
-
4
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
5
Optimization Of Fuzzy Logic Controllers With Genetic Algorithm For Two-Part-Type And Re-Entrant Production Systems
Published 2008“…Furthermore, genetic algorithm (GA) has been used to optimize the FLCs performance. …”
Get full text
Get full text
Thesis -
6
Performance evaluation metrics for multi-objective evolutionary algorithms in search-based software engineering: systematic literature review
Published 2021“…To evaluate such performance, it is necessary to consider a number of performance metrics that play important roles during the evaluation and comparison of investigated algorithms based on their best-simulated results. …”
Get full text
Get full text
Article -
7
Removal of heavy metals from water by functionalized carbon nanotubes with deep eutectic solvents: An artificial neural network approach / Seef Saadi Fiyadh
Published 2019“…The best result achieved for Pb2+ removal using ANFIS algorithm is with RE 7.078%. For As3+ removal using different adsorbents, two algorithms were applied for the modelling, the feed-forward back-propagation maximum RE achieved is 5.97% while, the NARX algorithm achieved better accuracy with maximum RE of 5.79%. …”
Get full text
Get full text
Get full text
Thesis -
8
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
10
-
11
State-Aware re-configuration model for multi-radio wireless Mesh Networks
Published 2017“…The ns-2 simulator is used as simulation tool and various metrics are evaluated. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
12
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
13
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
14
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
15
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
16
Segmentation of MRI brain images using statistical approaches
Published 2011“…Therefore, these algorithms can be improved upon. A neighbourhood-based noise-reduction algorithm which uses the edges of an image is proposed. …”
Get full text
Get full text
Thesis -
17
-
18
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
19
A hybrid grey wolf assisted-sparrow search algorithm for frequency control of RE integrated system
Published 2023“…Moreover, the robustness of the proffered method is also evaluated under the random varying load, variation of HPS system parameter, and weather intermittency of RE resources in real-time conditions. …”
Get full text
Get full text
Article -
20
Secure Image Steganography Using Encryption Algorithm
Published 2016“…Diffie-Hellman algorithm is used to determine the pixel on an image that will be used to store the message. …”
Get full text
Get full text
Conference or Workshop Item
