Search Results - (( java application a algorithm ) OR ( usability evaluation using algorithm ))
Search alternatives:
- java application »
- evaluation using »
- using algorithm »
- application a »
- a algorithm »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
3
Classroom finder system with student availability, space and time constraint
Published 2024“…Scrum methodology was selected for the development methodology of this project while the tools of HTML, CSS, JavaScript, Bootstrap, Jinja2 Template Engine, Flask, SQLite and VS Code are used in the development of this project. In the end of project, the unit testing, user acceptance testing, and usability testing has also been conducted to test the system. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Evaluating the usability of a Quranic theme extraction and visualization system using task-based usability testing
Published 2025“…Usability testing is crucial for evaluating the effectiveness and user experience of information retrieval systems. …”
Get full text
Get full text
Get full text
Article -
5
-
6
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
7
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
8
-
9
Multi-perspective usability evaluation with multi-criteria decision analysis for optimal selection of open-source software
Published 2021“…Thus, a multi-perspective approach has been used in usability evaluation to overcome the challenge of inconsistency between users’ perspectives, which would lead to an ill-advised decision on the selection of a suitable OSS. …”
Get full text
Get full text
Thesis -
10
Novel multi-perspective usability evaluation framework for selection of open source software based on BWM and group VIKOR techniques
Published 2021“…Thus, a multi-perspective approach has been used in usability evaluation to overcome the challenge of inconsistency between users’ perspectives; the inconsistency challenge would lead to an ill-advised decision on the selection of a suitable OSS. …”
Get full text
Get full text
Article -
11
ChoCD : Usable and secure graphical password authentication scheme
Published 2024thesis::master thesis -
12
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
13
An improved algorithm in test case generation from UML activity diagram using activity path
Published 2011“…This paper proposed an improved algorithm to automatically generate test cases directly from UML activity diagram using an activity graph.This algorithm has been implemented as a prototype using UML activity diagrams as inputs to generate test cases.These generated test cases are generated automatically are compared to test cases that are generated manually in order to evaluate the algorithm’s usability and reliability.The result shows that the test cases generated by the developed test case generator program are the same as the one manually derived.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
14
Real-Time Video Processing Using Native Programming on Android Platform
Published 2012“…However for the Android platform that based on the JAVA language, most of the software algorithm is running on JAVA that consumes more time to be compiled. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
15
Comparison and evaluation of multiple sequence alignment tools in bininformatics
Published 2009“…This study addresses this critical issue in relation to MSA algorithms by systematically comparing and evaluating the functionality, usability and the algorithms of three famous multiple sequence alignment tools. …”
Get full text
Article -
16
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
17
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
18
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…We hyave used the CPU profiler of Oracle JavaTM VisualVM to monitor the execution of LRE-TL as well as USG algorithms. …”
Get full text
Get full text
Conference or Workshop Item -
19
Real-time algorithmic music composition application.
Published 2022“…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Route Optimization System
Published 2005“…This algorithm is an exact algorithm that is specifically for finding the shortest route in a network. …”
Get full text
Get full text
Final Year Project
