Search Results - (( java application _ algorithm ) OR ( variable evaluation techniques algorithm ))
Search alternatives:
- evaluation techniques »
- java application »
- variable »
-
1
Enhancing obfuscation technique for protecting source code against software reverse engineering
Published 2019“…With these parameters it was possible to determine the ability of the proposed technique to defend the attack. The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
Get full text
Get full text
Thesis -
2
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…The average elapsed processing time have increased due to the implementation of the block subtraction technique and the variable block matching.…”
Get full text
Get full text
Get full text
Get full text
Thesis -
3
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
4
-
5
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
6
-
7
Performance evaluation of vector evaluated gravitational search algorithm II
Published 2014Get full text
Get full text
Conference or Workshop Item -
8
-
9
A Comparative Analysis of Peak Load Shaving Strategies for Isolated Microgrid Using Actual Data
Published 2022“…This paper presents a comparative analysis of a categorical variable decision tree algorithm (CVDTA) with the most common peak shaving technique, namely, the general capacity addition technique, to evaluate the peak shaving performance for an IMG system. …”
Get full text
Get full text
Article -
10
Mixed variable ant colony optimization technique for feature subset selection and model selection
Published 2013Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
The performance of Taguchi�s T-method with binary bat algorithm based on great value priority binarization for prediction
Published 2023“…This, however, leads to sub-optimality of prediction accuracy as the orthogonal array design lacks in offering higher-order variable interactions, in addition to its fixed and limited variable combinations to be assessed and evaluated. …”
Article -
13
-
14
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
16
Multi-label risk diabetes complication prediction model using deep neural network with multi-channel weighted dropout
Published 2025“…Comparative evaluations with existing dropout methods demonstrated the superior performance of the proposed technique, particularly when applied within the Algorithm Adaptation framework using DNNs. …”
Get full text
Get full text
Thesis -
17
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
18
Cloudlet deployment and task offloading in mobile edge computing using variable-length whale and differential evolution optimization and analytical hierarchical process for decisio...
Published 2023“…Comparing this developed algorithm with other algorithms shows its superiority in multi-objective optimization (MOO) evaluation metrics. …”
Get full text
Get full text
Thesis -
19
-
20
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item
