Search Results - (( data classification scheduling algorithm ) OR ( java application model algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Just Queuing: Policy-Based Scheduling Mechanism for Packet Switching Networks by Miaji, Yaser Shamsulhak A

    Published 2011
    “…In terms of the complexity property, genetic algorithm has an advantage in holding the fitness score of the queue in separate storage space which potentially minimises the complexity of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Real-time algorithmic music composition application. by Yap, Alisa Yi Hui

    Published 2022
    “…This project is about the study of evolutionary music, and focuses on the development of an algorithmic music composer using the Java programming language. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  6. 6
  7. 7

    Automated feature selection using boruta algorithm to detect mobile malware by Che Akmal, Che Yahaya, Ahmad Firdaus, Zainal Abidin, Salwana, Mohamad, Ernawan, Ferda, Mohd Faizal, Ab Razak

    Published 2020
    “…The malware has potential to compromise and steal the private data, classified data, instant messages, private business contacts, and confidential schedule. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8
  9. 9
  10. 10
  11. 11

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…In this type of environment it is nearly impossible to prove the effectiveness of a scheduling algorithm. Hence the main objective of this study is to develop a desktop grid simulator toolkit for measuring and modeling scheduler algorithm performance. …”
    Get full text
    Get full text
    Final Year Project
  12. 12

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…The objective of this study is to enhance the confidentiality and security of the image steganography application by combining cryptography algorithm. In this proposed model, the RSA algorithm is used to encrypt a secret message into an unreadable ciphertext before hiding it in the image. …”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    AI chatbot system for educational institutions by Tan, Hui Hui

    Published 2023
    “…This project presents the design and development of an advanced chatbot system powered by deep learning algorithms for intent classification. The chatbot's primary goal is to facilitate effective communication and support for users, particularly students inquiring about admission processes. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  16. 16

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…Therefore, efficient and robust servers that process separate client connections in separate threads are needed. Java applet is a well-known and widely used example of mobile code (a variation on the traditional client-server model). …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    A comprehensive review of optimization techniques in industrial applications: Trends, classifications, and future directions by Mukti Asih, Hayati, Mohamad, Effendi, Irianto, Ma’arif, Alfian

    Published 2025
    “…The research contribution of this review is to provide a structured classification of optimization methods—namely exact algorithms, heuristics, metaheuristics, and AI-integrated hybrid models—and to critically evaluate their practical applications, limitations, and emerging trends across industries. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19
  20. 20