Search Results - (( developing internet optimization algorithm ) OR ( java implementation new algorithm ))

Refine Results
  1. 1

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Predicting attackers of online shaming using ant colony optimization / Noor Shafiqa Fazlien Mohamad Fauzi by Mohamad Fauzi, Noor Shafiqa Fazlien

    Published 2020
    “…This study implemented Ant Colony Optimization Algorithm to develop classification rules for predicting the attackers of online shaming. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Application of genetic algorithm and JFugue in an evolutionary music generator by Tang, Jia Rou

    Published 2025
    “…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    A trust aware secure ant colony optimization based routing algorithm for Internet of Things by Sharmin, Afsah, Anwar, Farhat, Motakabber, S. M. A., Hassan Abdalla Hashim, Aisha

    Published 2023
    “…With the rapid spread of Internet of Things (IoT) systems enhancing the development of IoT applications, the issue of designing a secure routing algorithm for IoT, including reasonable trust management, has attracted more and more research attention. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    OPTIMIZED MIN-MIN TASK SCHEDULING ALGORITHM FOR SCIENTIFIC WORKFLOWS IN A CLOUD ENVIRONMENT by Murad S.S., Badeel R., Alsandi N.S.A., Alshaaya R.F., Ahmed R.A., Muhammed A., Derahman M.

    Published 2023
    “…To achieve this, we propose a new noble mechanism called Optimized Min-Min (OMin-Min) algorithm, inspired by the Min-Min algorithm. …”
    Review
  6. 6

    Fitness value based evolution algorithm approach for text steganalysis model by Din, Roshidi, Samsudin, Azman, Tuan Muda, Tuan Zalizam, Lertkrai, P., Amphawan, Angela, Omar, Mohd Nizam

    Published 2013
    “…In this paper, we present a new alternative method for text steganalysis based on an evolution algorithm, implemented using the Java Evolution Algorithms Package (JEAP).The main objective of this paper is to detect the existence of hidden messages ased on fitness values of a text description.It is found that the detection performance has been influenced by two groups of fitness values which are good fitness value and bad fitness value. …”
    Get full text
    Get full text
    Article
  7. 7

    Classification System for Heart Disease Using Bayesian Classifier by Magendram, Anusha

    Published 2007
    “…This system was developing base on to three main part which is data processing, testing and implementation of the algorithm. In this system a Bayesian algorithm was used in order to implement the system. …”
    Get full text
    Get full text
    Thesis
  8. 8

    Optimization grid scheduling with priority base and bees algorithm by Ahmed, Mohammed Shihab

    Published 2014
    “…The main aim of this current research to propose an optimization of the initial scheduler for grid computing using the bees algorithm. …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Development of high quality speech compression system for Quranic recitation based on modified CELP algorithm by Gunawan, Teddy Surya, Kartiwi, Mira

    Published 2013
    “…Lastly, we evaluate the performance of the developed algorithm objectively using PESQ (Perceptual Evaluation of Speech Quality). …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  10. 10

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
    Get full text
    Get full text
    Final Year Project
  11. 11

    Biometrics electronic purse by Abdul Rahman, Abdul Wahab, Eng, Chong Tan, S., M. Heng

    Published 1999
    “…This paper looked into using biometrics as a mean of authentication, thus requiring a new generation of Smart Card technology to be implemented in banking and multiple applications environment. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  12. 12

    Analysis of online CSR message authenticity on consumer purchase intention in social media on Internet platform via PSO-1DCNN algorithm by Li, Man, Liu, Fang, Abdullah, Zulhamri

    Published 2024
    “…This work proposes an algorithm based on PSO-1DCNN joint optimization to analyze the impact of online CSR information authenticity on consumers’ purchase intention in social media on the Internet platform. …”
    Get full text
    Get full text
    Article
  13. 13
  14. 14
  15. 15

    OPTIMIZATION OF MOBILE TRANSPORT NETWORK USING INTERNET PROTOCOL/MULTI-PROTOCOL LABEL SWITCHING (IP/MPLS) APPROACH by Ngo, Lip Chee

    Published 2014
    “…This report focuses on a research-based project of the title ‘Optimization of Mobile Transport Network using Internet Protocol/Multi-Protocol Label Switching (IP/MPLS) Approach’. …”
    Get full text
    Get full text
    Final Year Project
  16. 16
  17. 17

    Makespan algorithms and heuristic for internet-based collaborative manufacturing process using bottleneck approach by Bareduan, Sallehahmad, Hasan, Sulaiman

    Published 2010
    “…It was shown that using bottleneck-based analysis, effective makespan algorithms and constructive heuristic can be developed to solve for near-optimal scheduling sequence. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Hyperparameter tuned deep learning enabled intrusion detection on internet of everything environment by Ahmed Hamza, Manar, Hassan Abdalla Hashim, Aisha, G. Mohamed, Heba, S. Alotaibi, Saud, Mahgoub, Hany, S. Mehanna, Amal, Motwakel, Abdelwahed

    Published 2022
    “…In addition, Chaotic Local Search Whale Optimization Algorithm-based Feature Selection (CLSWOA-FS) technique is employed to choose the optimal feature subsets. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Priority and dynamic quantum time algorithms for central processing unit scheduling by Mohammed, Maysoon A.

    Published 2018
    “…The proposed algorithms (Priority Dynamic Quantum Time and Multi Priority Dynamic Quantum Time Algorithms) are implemented using JAVA programming language and validated using Key Performance Indicators equations. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Face recognition and identification system (FaceRec) / Khew Jye Huei by Khew , Jye Huei

    Published 2004
    “…It describes the implementation and functions of a working system that performs the recognition and identification of human faces using the implement algorithms. …”
    Get full text
    Get full text
    Thesis