Search Results - (( users selection method algorithm ) OR ( java application testing algorithm ))
Search alternatives:
- application testing »
- testing algorithm »
- selection method »
- method algorithm »
- java application »
- users selection »
-
1
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Literature review and experiment aimed to select the fastest lightweight geo-encryption algorithms and the smallest ciphertext and key size. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
Comparison of Search Algorithms in Javanese-Indonesian Dictionary Application
Published 2020“…Performance Testing is used to test the performance of algorithm implementations in applications. …”
Get full text
Get full text
Journal -
5
Development of a novel component carrier selection algorithm in long term evolution-advanced (LTE-A) with carrier aggregation
Published 2017“…At the early stage of migration, there will be many LTE users in the LTE-Advanced system. Therefore, CC selection algorithm that is responsible to assign a CC to each newly-arrived legacy LTE users is becoming of paramount importance in the LTE-Advanced system. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
6
Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm
Published 2023“…Existing embedding techniques depend on cover audio selected by users. Unknowingly, users may make a poor cover audio selection that is not optimised in its capacity or imperceptibility features, which could reduce the effectiveness of any embedding technique. …”
Get full text
Get full text
Get full text
Article -
7
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Finally, the system utilizes a query formulation algorithm (QRYF) to select the structured queries that best interpret user query. …”
Get full text
Get full text
Get full text
Thesis -
8
User recommendation algorithm in social tagging system based on hybrid user trust
Published 2013“…The hybrid User Trust method is able to find the most trusted users and selected as neighbours to generate recommendations. …”
Get full text
Get full text
Get full text
Article -
9
A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata
Published 2019“…We have proposed a clustering algorithm named Ordered Clustering with a specific characteristic that allows multiple membership in clusters which reflects the news nature and user behavior. …”
Get full text
Get full text
Thesis -
10
Multi-criteria acces selection mechanism based on user preferences in heterogeneous wireless networks
Published 2023“…It easily leads to access selection schemes that are out of line with the actual user requirements, and it does not improve user experience. …”
Get full text
Get full text
Get full text
Thesis -
11
An improved component carrier selection algorithm for downlink long term evolution advanced
Published 2014“…Given that there are multiple CCs available, an efficient CC selection algorithm is necessary in order to assign a CC to each LTE user. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Multiple users replica selection in data grids for fair user satisfaction: A hybrid approach
Published 2020“…Replica selection in data grids aims to select the best replica location based on the quality-of-service parameters preferred by the user. …”
Get full text
Get full text
Article -
13
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The method of selection of the input variables, the number of rules, and the learning rate are briefly discussed. …”
Get full text
Get full text
Get full text
Article -
14
Utilizing artificial bee colony algorithm as feature selection method in Arabic text classification
Published 2023“…One of the widely used algorithms for feature selection in text classification is the Evolutionary algorithm . …”
Get full text
Get full text
Get full text
Get full text
Article -
15
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
Published 2015“…Cloud broke ring is an intermediate negotiator between users and service providers. This negotiator helps users to select appropriate provider as their requests. . …”
Get full text
Get full text
Thesis -
16
Selection of access network using cost function method in heterogeneous wireless network
Published 2014“…Hence, a vertical handover network selection (VHONS) being used to aid in term of service quality for user's satisfaction of the mobile terminal.This article intends to propose a new method of choosing the vertical handover network. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
17
-
18
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…The selection is based on the user preferences since it uses a self-learning algorithm to determine triggers and handover thresholds dynamically. …”
Get full text
Get full text
Thesis -
19
Implementation of (AES) Advanced Encryption Standard algorithm in communication application
Published 2014“…The concept of ABS algorithm was firstly studied, including the definition, historical background, and a brief comparison was made between the ABS algorithm with other types of algorithm. …”
Get full text
Get full text
Undergraduates Project Papers -
20
Image classification using two dimensional wavelet coefficients with parallel computing
Published 2020“…In addition, this research does not require any pre-stored database to train the algorithm. This research requires the supervision from the users to train the algorithm by naming the region. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis
