Search Results - (( variable interaction effect algorithm ) OR ( java application service algorithm ))
Search alternatives:
- variable interaction »
- application service »
- service algorithm »
- effect algorithm »
- java application »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Fuzzy Adaptive Tuning of a Particle Swarm Optimization Algorithm for Variable-Strength Combinatorial Test Suite Generation
Published 2018“…In real-world software testing, the input variables may vary in how strongly they interact, variable strength combinatorial interaction testing (VS-CIT) can exploit this for higher effectiveness. …”
Get full text
Get full text
Get full text
Book Chapter -
4
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…A design proposal was outlined to provide an adaptive client/server approach to stream audio contents using Real-Time Transport Protocol (RTP) involving architecture based on the Java Media Framework (JMF) Application Programmable Interfaces (API).RTP protocol is the Internet-standard protocol for the transport of real-time data, including audio and video and can be implemented by using Java Media Framework (JMF). …”
Get full text
Get full text
Thesis -
5
HABC: Hybrid artificial bee colony for generating variable T-way test sets
Published 2020“…The input variables for a realworld software may diverge in how they strongly influence variable strength (VS) interaction can achieve that effectively. …”
Get full text
Get full text
Article -
6
HABC: Hybrid artificial bee colony for generating variable T-way test sets
Published 2020“…The input variables for a realworld software may diverge in how they strongly influence variable strength (VS) interaction can achieve that effectively. …”
Get full text
Get full text
Article -
7
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
8
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing
Published 2025“…The effectiveness of these algorithms, also called metaheuristics, largely depends on the capabilities of their search techniques. …”
Get full text
Get full text
Article -
10
A Two Pressure-Velocity Approach for Immersed Boundary Methods in Three Dimensional Incompressible Flows
Published 2013“…The algorithm calculates the interactions between incompressible viscous flows and a solid shape in three-dimensional domain. …”
Get full text
Get full text
Conference or Workshop Item -
11
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…A GUI is created in a form of JAVA application to display data detected from tag. …”
Get full text
Get full text
Thesis -
12
-
13
-
14
Development of genetic algorithm for optimization of yield models in oil palm production
Published 2018“…This research concludes that the GA method is a user-friendly variable selection tool with excellent results because it can choose variables correctly.…”
Get full text
Get full text
Get full text
Article -
15
Development of an effective clustering algorithm for older fallers
Published 2022Get full text
Get full text
Article -
16
A NEW APPROACH IN EMPIRICAL MODELLING OF CO2 CORROSION WITH THE PRESENCE OF HAc AND H2S
Published 2011“…In order to study CO2 corrosion of carbon steel involving interactive effects of several key parameters, a proven systematic statistical method that can represent the multitude interactive effects is needed. …”
Get full text
Get full text
Thesis -
17
Data driven neuroendocrine pid controller for mimo plants based adaptive safe experimentation dynamics algorithm
Published 2020“…Besides, the SbSR-NEPID was effective in reducing the error in a transient state, and MnHR-NEPID provided effective interaction between nodes available in MIMO systems which contributed to accuracy improvement.…”
Get full text
Get full text
Thesis -
18
How social media crisis response and social interaction is helping people recover from Covid-19: an empirical investigation
Published 2022“…The result shows that all the variables are useful and reveal good performance. Thus, crisis management and communication activities should pay more attention to these variables for effective social media crisis communication. …”
Get full text
Get full text
Article -
19
A parallel genetic algorithm-based TSK-Fuzzy system for dynamic car-following modeling
Published 2009“…The proposed model is used for the tire-road slippage index determination which influences the car's speed. Since the car interact with each other on the road and the driver progressive level is different, three interaction variables, that are current car speed, distance to the car ahead and driver progressive level, are defined and an indication of their influence on the tire-road slippage index is analysed. …”
Get full text
Get full text
Article -
20
Survey on input output relation based combination test data generation strategies
Published 2015“…Combinatorial test data generation strategies have been known to be effective to detect the fault in the product due to the interaction between the product’s features. …”
Get full text
Get full text
Get full text
Article
