Search Results - (( variable interaction term algorithm ) OR ( java application during algorithm ))
Search alternatives:
- variable interaction »
- application during »
- interaction term »
- java application »
- during algorithm »
- term algorithm »
-
1
A variable combinatorial test suite strategy based on modified greedy algorithm
Published 2015“…A variable strength interaction is the interaction between some of software features which have higher priority than the interaction between the others software features. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
A new variable strength t-way strategy based on the cuckoo search algorithm
Published 2019“…Despite much progress, existing strategies have not sufficiently dealt with more than one interaction between input parameters (termed variable strength tway). …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
3
Data driven neuroendocrine pid controller for mimo plants based adaptive safe experimentation dynamics algorithm
Published 2020“…Therefore, this study proposed the adaptive safe experimentation dynamics (ASED) algorithm to improve the SED algorithm performance accuracy by minimizing its objective function in terms of mean, best, worst, and standard deviation analysis. …”
Get full text
Get full text
Thesis -
4
Enhancing Harmony Search Metaheuristic Algorithm for Coverage Efficiency, Test Suite Reduction, and Running Time in Combinatorial Interaction Testing
Published 2025“…The experimental results demonstrate that eHS outperforms the other algorithms for CIT in terms of coverage efficiency and test suite reduction. …”
Get full text
Get full text
Article -
5
-
6
SUDOKU HELPER
Published 2015“…In this paper research, author presents an algorithm to provide a tutorial for any Sudoku player who got stuck during the solving process. …”
Get full text
Get full text
Final Year Project -
7
Solving large-scale problems using multi-swarm particle swarm approach
Published 2018“…The results showed that the proposed PSO algorithm outperformed the other algorithms in terms of the optimal solutions and the convergence.…”
Get full text
Get full text
Get full text
Article -
8
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
9
Harmony search-based robust optimal controller with prior defined structure
Published 2013“…In this approach, a combination of interacting two levels HS optimization algorithm is presented. …”
Get full text
Get full text
Thesis -
10
Network game (Literati) / Chung Mei Kuen
Published 2003“…By using Java applet, it will give a good interactive response since it does not suffer from the delays or variability of bandwidth associated with network connection. …”
Get full text
Get full text
Thesis -
11
-
12
Design and development of elective courses recommender system (ECORS)
Published 2017“…The main purpose is to examine the user's experience towards ECQRS in terms of quality of recommended items, interaction adequacy, interface adequacy. perceived ease of use, perceived usefulness and attitudes toward system.…”
Get full text
Get full text
Get full text
Final Year Project Report / IMRAD -
13
-
14
Analysis of daytime and nighttime ground level ozone concentrations using boosted regression tree technique
Published 2017“…Sensitivity testing of the BRT model was conducted to determine the best parameters and good explanatory variables. Using the number of trees between 2,500-3,500, learning rate of 0.01, and interaction depth of 5 were found to be the best setting for developing the ozone boosting model. …”
Get full text
Get full text
Get full text
Article -
15
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
16
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…This research work was limited to Java based web applications. In future research, the method can be extended to include other programming languages as well as other similar web application security vulnerabilities.…”
Get full text
Get full text
Thesis -
17
Removal of heavy metals from water by functionalized carbon nanotubes with deep eutectic solvents: An artificial neural network approach / Seef Saadi Fiyadh
Published 2019“…The modelling results revealed that NARX algorithm is the best compared to the used algorithms in term of accuracy. …”
Get full text
Get full text
Get full text
Thesis -
18
Human activity recognition via accelerometer and gyro sensors
Published 2023“…To implement the data engineering system proposed, two mobile applications, SensorData and SensorDataLogger with user-friendly interfaces and intuitive functionalities are developed using Java programming language and Android Studio. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
Design & Development of a Robotic System Using LEGO Mindstorm
Published 2006“…Since the model is built using LEGO bricks, the model is fully customized, in term of its applications, to perform any relevant tasks. Ultimately, the algorithm development program designed earlier is linked up directly to the robotic model for program implementation and verification. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
All-in-1 adverse drug reaction reporting system / Long Chiau Ming … [et al.]
Published 2014“…Probability is assigned via a score termed definite, probable, possible or doubtful. Values obtained from this algorithm are used in peer reviews to verify the validity of reporter’s conclusion regarding ADRs. …”
Get full text
Get full text
Get full text
Book Section
