Search Results - (( users selection method algorithm ) OR ( java applications using algorithm ))
Search alternatives:
- applications using »
- java applications »
- selection method »
- method algorithm »
- users selection »
- using algorithm »
-
1
Route Optimization System
Published 2005“…The method used to develop this project is Rapid Application Development (RAD). …”
Get full text
Get full text
Final Year Project -
2
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
4
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…This research was undertaken to develop methods to mitigate shoulder-surfing attack. Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
5
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We extracted 30 different features from network traffic. We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
6
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The methodology is based on JavaScript and PHP languages for developing a new technique called DetectCombined capable of filtering queries using parameterized queries to protect against SQL injection which is a safe method. …”
Get full text
Get full text
Get full text
Article -
7
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
-
10
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
11
Development of a novel component carrier selection algorithm in long term evolution-advanced (LTE-A) with carrier aggregation
Published 2017“…At the early stage of migration, there will be many LTE users in the LTE-Advanced system. Therefore, CC selection algorithm that is responsible to assign a CC to each newly-arrived legacy LTE users is becoming of paramount importance in the LTE-Advanced system. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
12
Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm
Published 2023“…Existing embedding techniques depend on cover audio selected by users. Unknowingly, users may make a poor cover audio selection that is not optimised in its capacity or imperceptibility features, which could reduce the effectiveness of any embedding technique. …”
Get full text
Get full text
Get full text
Article -
13
Effective query structuring with ranking using named entity categories for XML retrieval
Published 2016“…Finally, the system utilizes a query formulation algorithm (QRYF) to select the structured queries that best interpret user query. …”
Get full text
Get full text
Get full text
Thesis -
14
User recommendation algorithm in social tagging system based on hybrid user trust
Published 2013“…The hybrid User Trust method is able to find the most trusted users and selected as neighbours to generate recommendations. …”
Get full text
Get full text
Get full text
Article -
15
A hybrid approach for personalized news recommendation with ordered clustering algorithm, rich user and news metadata
Published 2019“…We have proposed a clustering algorithm named Ordered Clustering with a specific characteristic that allows multiple membership in clusters which reflects the news nature and user behavior. …”
Get full text
Get full text
Thesis -
16
Multi-criteria acces selection mechanism based on user preferences in heterogeneous wireless networks
Published 2023“…It easily leads to access selection schemes that are out of line with the actual user requirements, and it does not improve user experience. …”
Get full text
Get full text
Get full text
Thesis -
17
An improved component carrier selection algorithm for downlink long term evolution advanced
Published 2014“…Given that there are multiple CCs available, an efficient CC selection algorithm is necessary in order to assign a CC to each LTE user. …”
Get full text
Get full text
Get full text
Get full text
Proceeding Paper -
18
Multiple users replica selection in data grids for fair user satisfaction: A hybrid approach
Published 2020“…Replica selection in data grids aims to select the best replica location based on the quality-of-service parameters preferred by the user. …”
Get full text
Get full text
Article -
19
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Effects of user selected conditions on modeling of dynamic systems using adaptive fuzzy model
Published 2001“…The method of selection of the input variables, the number of rules, and the learning rate are briefly discussed. …”
Get full text
Get full text
Get full text
Article
