Search Results - (( java application design algorithm ) OR ( model evaluation methods algorithm ))
Search alternatives:
- application design »
- evaluation methods »
- methods algorithm »
- java application »
- design algorithm »
- model evaluation »
-
1
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The project objectives includes:(i) To investigate lightweight message encryption algorithms by benchmarking their efficiency in terms of computation speed and generated cipher text size; (ii) To design and develop the TalkOut mobile application with lightweight message encryption by using prototype software development model.; and (iii) To evaluate the usability performance of the developed proposed TalkOut mobile application using System Usability Scale (SUS) approach. …”
Get full text
Get full text
Get full text
Academic Exercise -
2
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
3
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
4
-
5
Neural Networks Ensemble: Evaluation of Aggregation Algorithms for Forecasting
Published 2013“…These algorithms include equal�weights combination of Best NN models, combination of trimmed forecasts, combination through Variance-Covariance method and Bayesian Model Averaging. …”
Get full text
Get full text
Thesis -
6
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
7
-
8
Unifying the evaluation criteria of many objectives optimization using fuzzy Delphi method
Published 2021“…Thus, unify a set of most suitable evaluation criteria of the MaOO is needed. This study proposed a distinct unifying model for the MaOO evaluation criteria using the fuzzy Delphi method. …”
Get full text
Get full text
Article -
9
Evaluating the effectiveness of integrated benders decomposition algorithm and epsilon constraint method for multi-objective facility location problem under demand uncertainty
Published 2017“…For this aim, a multi-objective facility location allocation model is proposed. In this case, an integrated BDA and epsilon constraint method are proposed and it is shown that how Pareto points in multi-objective facility location model can be found. …”
Get full text
Get full text
Get full text
Article -
10
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
11
-
12
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
13
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item -
14
Standardizing and weighting the evaluation criteria of many-objective optimization competition algorithms based on fuzzy delphi and fuzzy-weighted zero-inconsistency methods
Published 2021“…The evaluation criteria of Many Objective Optimization algorithm (MaOO) play a critical role in evaluating the competition MaOO algorithms. …”
Get full text
Get full text
Thesis -
15
Incorporating the range-based method into GridSim for modeling task and resource heterogeneity
Published 2017“…In this paper, we propose a new simulation model that incorporates the range-based method into GridSim for modeling and simulating heterogeneous tasks and resources in order to capture the inherent heterogeneity of Grid environments that later can be used by other researchers to test their algorithms.…”
Get full text
Get full text
Get full text
Article -
16
Evaluation of Lightning Current Using Inverse Procedure Algorithm.
Published 2013“…The proposed method considers on all electromagnetic fields components and can evaluate full shape of current, velocity and constant parameters of current models in contrast with previous studies. …”
Get full text
Get full text
Article -
17
Hybrid performance measures and mixed evaluation method for data classification problems
Published 2012“…In fact, no previous studies employ mixed evaluation method in evaluating and comparing the performance measures. …”
Get full text
Get full text
Thesis -
18
Analytical Study Of Machine Learning Models For Stock Trading In Malaysian Market
Published 2024“…By setting the ML algorithms and their parameter along with using Walk-Forward Analysis (WFA) method, the algorithm design of trading signal was evaluated based on two groups of evaluation indicators, namely directional and performance. …”
thesis::master thesis -
19
Development of an Automated Technique for Reconstructing Jawi Characters in Historical Documents
Published 2007“…A noise model has been developed to test the reliability of the proposed algorithm. …”
Get full text
Get full text
Thesis -
20
Visualisasi pohon sintaksis berasaskan model dan algoritma sintaks ayat bahasa Melayu
Published 2018“…To achieve these objectives (the algorithm, the model and the X-bar rules), five phases of research methods involved namely identifying the research gap, the sentence and rules categorization, model and algorithm design phase, prototype development evaluation and conclusion phase. …”
Get full text
Get full text
Get full text
Get full text
Thesis
