Search Results - (( developing agent data algorithm ) OR ( java validation using algorithm ))

Refine Results
  1. 1

    AGENT MEETING SCHEDULER by ZAINAL ABIDIN, NURAINI

    Published 2011
    “…A deep study of agent algorithm is conducted based on current available agent meeting scheduler from combination of software agent and algorithm data structure knowledge. …”
    Get full text
    Get full text
    Final Year Project
  2. 2

    Intelligent agent for e-commerce using genetic algorithm / Kok Sun Sun by Kok , Sun Sun

    Published 2000
    “…In order to develop an intelligent agent, various programming techniques are used in achieving the property of self learning, information retrieval and searching algorithm. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Agent-based extraction algorithm for computational problem solving by Rajabi, Maryam

    Published 2015
    “…Four agents have been proposed as an agent based model for CPS, which are User_Agent, PAC_Agent, IPO_Agent and Algorithm_Agent. …”
    Get full text
    Get full text
    Thesis
  5. 5

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Development of gene motif modulation for information processing in artificial DNA computing by Shamsudin, Ahmad Faizul, Suhaimi, Mohd Adam, Ibrahim Ali , Noorbatcha, Hussin, Ummu Salamah, A. F., Alya Khadijah, D., Nor Hidayah

    Published 2014
    “…In the artificial DNA computing model, the MAS (Multi-Agent System) algorithm depicts the sender agent transmits moleware information through the control agent which is then converted to binary data as input to the receiver agent. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  9. 9
  10. 10

    Security framework based multi agent system architecture to facilitate data fetching from cloud data storage by Mohamed, Amir Mohamed Talib

    Published 2012
    “…This security framework consists of two main layers of agent layer and CDS layer. The proposed MAS architecture includes five types of agents: Cloud Service Provider Agent (CSPA), Cloud Data Correctness Agent (CDCorA), Cloud Data Confidentiality Agent (CDConA), Cloud Data Availability Agent (CDAA) and Cloud Data Integrity Agent (CDIA). …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12

    A collaborative agent based green IS practice assessment tool for environmental sustainability attainment in enterprise data centers by Anthony, Bokolo Jnr., Mazlina, Abdul Majid, Awanis, Romli

    Published 2018
    “…Purpose; The purpose of this paper is to develop a collaborative agent-based web architecture and an agent-based green IS assessment tool to aid information technology (IT) practitioners in data centers assess their current green information systems (IS) practice toward attaining sustainability. …”
    Get full text
    Get full text
    Get full text
    Article
  13. 13

    A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm by Ba-Quttayyan, Bakr Salim Abdullah

    Published 2024
    “…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Adaptive genetic algorithm to improve negotiation process by agents e-commerce by Ebadi, Sahar

    Published 2011
    “…The proposed negotiation algorithm employs Bayesian learning and similarity functions in order to predict opponent agent’s type and preferences. …”
    Get full text
    Get full text
    Thesis
  16. 16

    A machine learning approach to tourism recommendations system by Chia, An

    Published 2025
    “…This project aims to develop a tourism attractions recommendation system by integrating machine learning recommendation algorithms. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  17. 17

    Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly by Zulkifly, Ahmad Zuladzlan

    Published 2019
    “…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
    Get full text
    Get full text
    Thesis
  18. 18

    Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization by Mohammad Ata, Karimeh Ibrahim

    Published 2019
    “…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Secure E-Voting With Blind Signature by Ibrahim, Subariah, Kamat, Maznah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
    Get full text
    Get full text
    Conference or Workshop Item
  20. 20

    Hybridization of nonlinear sine cosine and safe experimentation dynamics algorithms for solving control engineering optimization problems by Mohd Helmi, Suid

    Published 2024
    “…Moreover, the Nonlinear Sine Cosine Algorithm-Safe Experimentation Dynamic (NSCA-SED) introduces a hybridization of multi-agent and single-agent algorithms, presenting a dynamic approach with random perturbation to navigate search trajectories effectively, and release design parameters that might be trapped in local optima. …”
    Get full text
    Get full text
    Thesis