Search Results - (( developing content optimization algorithm ) OR ( java validation using algorithm ))
Search alternatives:
- content optimization »
- developing content »
- validation using »
- java validation »
- using algorithm »
-
1
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
2
Comparison between multi-objective and single-objective optimization for the modeling of dynamic systems
Published 2013Get full text
Working Paper -
3
-
4
Priority and dynamic quantum time algorithms for central processing unit scheduling
Published 2018“…Central Processing Unit is scheduled using different types of scheduling algorithms. One of the most widely algorithm used in scheduling with sharing and batch operating systems is Round Robin. …”
Get full text
Get full text
Thesis -
5
A Model for Evaluation of Cryptography Algorithm on UUM Portal
Published 2004“…The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
Get full text
Get full text
Get full text
Thesis -
6
-
7
Optimised content-social based features for fake news detection in social media using text clustering approach
Published 2025“…Ultimately, this research concludes that the developed fake news detection model based on the designed content-social-based features can effectively detect fake news in real-world news…”
Get full text
Get full text
Get full text
Thesis -
8
Meta-Heuristic Algorithms for Learning Path Recommender at MOOC
Published 2021“…The recommended studying path satisfies several learner criteria, such as the critical learning path, number of enrollments, learning duration, popularity, rating of previous learners, and cost. We have developed Metaheuristic algorithms includes the Genetic Algorithm (GA) and Ant Colony Optimization Algorithm (ACO), to solve the proposed model. …”
Get full text
Get full text
Article -
9
Genetic algorithms for VLSI micro-Cell layout area optimization based on binary tree
Published 2009Get full text
Working Paper -
10
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…In addition, the randomness of the session key generated from the MLCG is verified using NIST test suite. Besides that, the security of the proposed protocol is validated using the formal analysis tool, AVISPA. …”
Get full text
Get full text
Thesis -
11
Neural network modeling and optimization for spray-drying coconut milk using genetic algorithm and particle swarm optimization
Published 2022“…Firstly, using MATLAB program, the ANN model is developed based on optimized topology and is then furthered optimized by genetic algorithm (GA) and particle swarm optimization (PSO) using MINITAB program. …”
Get full text
Get full text
Thesis -
12
A framework of test case prioritisation in regression testing using particle swarm-artificial bee colony algorithm
Published 2024“…Ten knowledge and domain experts provided positive feedback on the framework's verification, affirming the framework's robustness. Validation was conducted through three experiments involving four Java programs. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
13
A framework of rough cultural algorithms in optimizing mobile web caching performance
Published 2007“…Consequently, The proposed caching scheme, Rough Cultural Algorithm (RCA) is developed to materialise the caching policies.…”
Get full text
Get full text
Article -
14
Optimization of robot plasma coating efficiency using genetic algorithm and neural networks / S.Prabhu and B.K.Vinayagam
Published 2017“…This work describes the Taguchi analysis coupled with Artificial Neural network and Genetic algorithm to optimize the robot deposition parameters used for plasma coating on titanium aluminum alloy material. …”
Get full text
Get full text
Get full text
Article -
15
Web-based clustering tool using fuzzy k-mean algorithm / Ahmad Zuladzlan Zulkifly
Published 2019“…On the Construction phase, the development of the prototype has been started. All the algorithm for the engine has been developed by using Java script language. …”
Get full text
Get full text
Thesis -
16
Social media mining: a genetic based multiobjective clustering approach to topic modelling
Published 2021“…Most of these algorithms are not optimized, even if they are, they are only optimized by using a single objective method and may underperform when solving real-world problems which are typically multi-objectives in nature. …”
Get full text
Get full text
Article -
17
-
18
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. Few by electronic components such as RFID, multiplexer, XBee, and servo motors have been used to realize the system. …”
Get full text
Get full text
Thesis -
19
-
20
Secure E-Voting With Blind Signature
Published 2003“…The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it.…”
Get full text
Get full text
Conference or Workshop Item
