Search Results - (( users selection based algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- java application »
- users selection »
- selection based »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
Get full text
Get full text
Get full text
Academic Exercise -
2
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Over the years, various picture-based password systems were proposed to exploit the utility of pictures for user authentication. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
5
Tourist Trip Design Problem with user preference and popularity: a case study of Langkawi Island / Nabilah Anuar Ahmad and Huda Zuhrah Ab. Halim
Published 2023“…The algorithm will choose POIs based on categories selected by the users. …”
Get full text
Get full text
Book Section -
6
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…The selection is based on the user preferences since it uses a self-learning algorithm to determine triggers and handover thresholds dynamically. …”
Get full text
Get full text
Thesis -
7
A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata
Published 2019“…A new model in news selection is proposed based on sub-modularity model. …”
Get full text
Get full text
Thesis -
8
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
9
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…The first algorithm is based on integrating the maximum product of effective channel gains and the maximum SIR with the PF principle (PF-MPECG-SIR) to select strong users in the first stage and weak users in the second stage. …”
Get full text
Get full text
Thesis -
10
Using GA and KMP algorithm to implement an approach to learning through intelligent framework documentation
Published 2023“…A new case is retained in the case base for future retrievals. A framework user is allowed to select from a list of features provided by the framework that he or she is interested in learning, and the system will give an example of application related to the selected features. …”
Conference paper -
11
Web-Based Route Optimization System For Logistic Using Agglomerative Clustering And Genetic Algorithm
Published 2020“…This system enables the logistic company to arrange its route to deliver based on the number of trucks selected by the user. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
12
User recommendation algorithm in social tagging system based on hybrid user trust
Published 2013“…The hybrid User Trust method is able to find the most trusted users and selected as neighbours to generate recommendations. …”
Get full text
Get full text
Get full text
Article -
13
Multiple users replica selection in data grids for fair user satisfaction: A hybrid approach
Published 2020“…Replica selection in data grids aims to select the best replica location based on the quality-of-service parameters preferred by the user. …”
Get full text
Get full text
Article -
14
-
15
Mobile user location prediction: genetic algorithm-based approach
Published 2010“…This paper presents a prediction of user location using genetic algorithm and based location history in finding a number of solutions of possible location when applied to recorded context histories, framework is presented and the result are discussed. …”
Get full text
Get full text
Get full text
Proceeding Paper -
16
-
17
Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm
Published 2023“…Existing embedding techniques depend on cover audio selected by users. Unknowingly, users may make a poor cover audio selection that is not optimised in its capacity or imperceptibility features, which could reduce the effectiveness of any embedding technique. …”
Get full text
Get full text
Get full text
Article -
18
Hybrid LTE-Vanets Based Optimal Radio Access Selection
Published 2018“…The periodically broadcasted network information supports mobile users to make their selection decisions;mobiles consider their own individual preferences,cost and partial QoS information signaled by the network while making their decision.The switches algorithm between VANET and LTE based on the load value of network and quality of service requirements were proposed.The simulation results have shown that the proposed algorithm has better performance compared with LTE and VANETs separately in terms of packet delivery ratio,latency and application-level throughput. …”
Get full text
Get full text
Get full text
Get full text
Article -
19
-
20
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The implementation and the computational aspects of the training algorithm are also highlighted. Three examples of discrete-time nonlinear systems are used in the simulation study to show the effects of user selected conditions on the identification process. …”
Get full text
Get full text
Get full text
Article
