Search Results - (( variable interaction effect algorithm ) OR ( java application service algorithm ))

Refine Results
  1. 1

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  2. 2
  3. 3

    Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation by Kamal Z., Zamli, Ahmed, Bestoun S., Mahmoud, Thair, Afzal, Wasif

    Published 2018
    “…In real-world software testing, the input variables may vary in how strongly they interact, variable strength combinatorial interaction testing (VS-CIT) can exploit this for higher effectiveness. …”
    Get full text
    Get full text
    Get full text
    Book Chapter
  4. 4

    Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework by Asaad Aref, Ibrahim

    Published 2004
    “…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
    Get full text
    Get full text
    Thesis
  5. 5

    HABC: Hybrid artificial bee colony for generating variable T-way test sets by Alazzawi, A.K., Rais, H.M., Basri, S.

    Published 2020
    “…The input variables for a realworld software may diverge in how they strongly influence variable strength (VS) interaction can achieve that effectively. …”
    Get full text
    Get full text
    Article
  6. 6

    HABC: Hybrid artificial bee colony for generating variable T-way test sets by Alazzawi, A.K., Rais, H.M., Basri, S.

    Published 2020
    “…The input variables for a realworld software may diverge in how they strongly influence variable strength (VS) interaction can achieve that effectively. …”
    Get full text
    Get full text
    Article
  7. 7

    Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform by Alias, Norma, Satam, Noriza, Abd. Ghaffar, Zarith Safiza, Darwis, Roziha, Hamzah, Norhafiza, Islam, Md. Rajibul

    Published 2009
    “…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  8. 8

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  9. 9

    Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing by Muazu, Aminu Aminu, Hashim, Ahmad Sobri

    Published 2025
    “…The effectiveness of these algorithms, also called metaheuristics, largely depends on the capabilities of their search techniques. …”
    Get full text
    Get full text
    Article
  10. 10

    A Two Pressure-Velocity Approach for Immersed Boundary Methods in Three Dimensional Incompressible Flows by Tuan Mohammad Yusoff, Tuan Ya, Sabir, O., Norhafizan, Ahmed, Y., Nukman

    Published 2013
    “…The algorithm calculates the interactions between incompressible viscous flows and a solid shape in three-dimensional domain. …”
    Get full text
    Get full text
    Conference or Workshop Item
  11. 11

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  12. 12
  13. 13
  14. 14

    Development of genetic algorithm for optimization of yield models in oil palm production by Hilal, Yousif Y., Wan Ismail, Wan Ishak, Yahya, Azmi, Ash’aari, Zulfa Hanan

    Published 2018
    “…This research concludes that the GA method is a user-friendly variable selection tool with excellent results because it can choose variables correctly.…”
    Get full text
    Get full text
    Get full text
    Article
  15. 15
  16. 16

    A NEW APPROACH IN EMPIRICAL MODELLING OF CO2 CORROSION WITH THE PRESENCE OF HAc AND H2S by PANCA ASMARA, YULI PANCA ASMARA

    Published 2011
    “…In order to study CO2 corrosion of carbon steel involving interactive effects of several key parameters, a proven systematic statistical method that can represent the multitude interactive effects is needed. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Data driven neuroendocrine pid controller for mimo plants based adaptive safe experimentation dynamics algorithm by Mohd Riduwan, Ghazali

    Published 2020
    “…Besides, the SbSR-NEPID was effective in reducing the error in a transient state, and MnHR-NEPID provided effective interaction between nodes available in MIMO systems which contributed to accuracy improvement.…”
    Get full text
    Get full text
    Thesis
  18. 18

    How social media crisis response and social interaction is helping people recover from Covid-19: an empirical investigation by Bukar, Umar Ali, A. Jabar, Marzanah, Sidi, Fatimah, Nor, R. N. H., Abdullah, Salfarina, Ishak, Iskandar

    Published 2022
    “…The result shows that all the variables are useful and reveal good performance. Thus, crisis management and communication activities should pay more attention to these variables for effective social media crisis communication. …”
    Get full text
    Get full text
    Article
  19. 19

    A parallel genetic algorithm-based TSK-Fuzzy system for dynamic car-following modeling by Purnomo, Muhammad Ridwan Andi, Abdul Wahab, Dzuraidah, Hassan, Azmi, Rahmat, Riza Atiq

    Published 2009
    “…The proposed model is used for the tire-road slippage index determination which influences the car's speed. Since the car interact with each other on the road and the driver progressive level is different, three interaction variables, that are current car speed, distance to the car ahead and driver progressive level, are defined and an indication of their influence on the tire-road slippage index is analysed. …”
    Get full text
    Get full text
    Article
  20. 20

    Survey on input output relation based combination test data generation strategies by Alsewari, Abdulrahman A., Tairan, Nasser M., Kamal Z., Zamli

    Published 2015
    “…Combinatorial test data generation strategies have been known to be effective to detect the fault in the product due to the interaction between the product’s features. …”
    Get full text
    Get full text
    Get full text
    Article