Search Results - (( variable generation process algorithm ) OR ( java application service algorithm ))
Search alternatives:
- variable generation »
- application service »
- generation process »
- process algorithm »
- service algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Message based random variable length key encryption algorithm.
Published 2009“…Results: Attack on the key generation process was prevented because of random key generation and its dependency to input message. …”
Get full text
Get full text
Article -
4
Adapting the Elitism on the Greedy Algorithm for Variable Strength Combinatorial Test Cases Generation
Published 2018“…The VS-MGS’s results ultimately revealed that the adaptation of elitism mechanism with iteration in greedy algorithm resulted in an improved efficiency in the process of generating a near-optimal test case set size.…”
Get full text
Get full text
Get full text
Article -
5
Adopting A Particle Swarm-Based Test Generator Strategy For Variable-Strength And T-Way Testing
Published 2011“…This thesis presents the design and implementation of a new interaction test generation strategy, known as the Particle Swarm-based Test Generator (PSTG), for generating t-way and variable-strength test suites. …”
Get full text
Get full text
Thesis -
6
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
7
Optimized clustering with modified K-means algorithm
Published 2021“…In dealing with correlated variables, PCA was embedded in the proposed algorithm. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Unlike the existing optimization algorithm, VL-WIDE features the capability of searching different lengths of solutions to cover the variable number of cloudlets for deployment. …”
Get full text
Get full text
Thesis -
9
Systematic design of chemical reactors with multiple stages via multi-objective optimization approach
Published 2015Get full text
Get full text
Conference or Workshop Item -
10
Dynamic Bayesian networks and variable length genetic algorithm for designing cue-based model for dialogue act recognition
Published 2010“…In the second stage, the developed variable length genetic algorithm is used to select different sets of lexical cues to constitute the dynamic Bayesian networks' random variables. …”
Get full text
Get full text
Article -
11
To study the multi-objective optimization of EDM using genetic algorithm
Published 2013“…Development of EDM process has resulted in significant improvements in operating techniques, productivity and accuracy, which the result of this machining development has helped variability in EDM process. …”
Get full text
Get full text
Undergraduates Project Papers -
12
Seed disperser ant algorithm for optimization / Chang Wen Liang
Published 2018“…The Seed Disperser Ant Algorithm (SDAA) is developed based on the evolution or expansion process of Seed Disperser Ant (Aphaenogaster senilis) colony. …”
Get full text
Get full text
Get full text
Thesis -
13
Test of Self Por [decoded] trait no. 2 / Syafiq Abdul Samat
Published 2021“…Inspired by some of the generative art made via programming, I was able to create my own algorithmic concept, using these “noises” as factors or variables to affect the creation of the proposed visual. …”
Get full text
Get full text
Book Section -
14
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
-
16
-
17
Prediction of hydropower generation via machine learning algorithms at three Gorges Dam, China
Published 2024“…Three different scenarios are examined, such as scenario1 (SC1): used to predict daily power generation, scenario 2 (SC2): used to predict power generation for monthly prediction and scenario 3 (SC3): used to predict hydropower generation (HPG) seasonally. …”
Article -
18
Adopting genetic algorithm to enhance state-sensitivity partitioning
Published 2015“…The technique used in generating test cases may lead to effective and efficient software testing process. …”
Get full text
Get full text
Conference or Workshop Item -
19
Adopting genetic algorithm to enhance state-sensitivity partitioning
Published 2015“…Software testing requires executing software under test with the intention of finding defects as much as possible. Test case generation remains the most dominant research in software testing.The technique used in generating test cases may lead to effective and efficient software testing process.Many techniques have been proposed to generate test cases.One of them is State Sensitivity Partitioning (SSP) technique.The objective of SSP is to avoid exhaustive testing of the entire data states of a module. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise
