Search Results - (( developing mobile verification algorithm ) OR ( java optimization method algorithm ))
Search alternatives:
- verification algorithm »
- mobile verification »
- java optimization »
- method algorithm »
-
1
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
2
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
3
Fuzzy modeling using Bat Algorithm optimization for classification
Published 2018“…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
4
Development of android application for peninsular Malaysia GEOID height calculator / Mohamad Nazir Md Nazri
Published 2021“…There is also an analysis that been done which is the verification of the algorithm in the developed application and the comparison between a different interpolation method. …”
Get full text
Get full text
Thesis -
5
Design of Improved Stream Cipher Algorithms for GSM Communication
Published 2024thesis::master thesis -
6
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research study with the development of the Optimal Route Checking Using Genetic Algorithm system should solve this scenario. …”
Get full text
Get full text
Thesis -
7
Optimize class time tabling by using genetic algorithm technique in UTHM
Published 2019“…This research used genetic algorithm (GA) that was applied to java programming languages with a goal of reducing conflict and optimizing the fitness. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
8
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This study proposes a combinatorial testing method utilizing the Whale Optimization Algorithm (WOA). …”
Get full text
Get full text
Get full text
Article -
9
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Features selection process can be considered a problem of global combinatorial optimization in machine learning. Genetic algorithm GA had been adopted to perform features selection method; however, this method could not deliver an acceptable detection rate, lower accuracy, and higher false alarm rates. …”
Get full text
Get full text
Thesis -
10
Comparison of performances of Jaya Algorithm and Cuckoo Search algorithm using benchmark functions
Published 2022“…Metaheuristic algorithms have been used successfully for solving different optimization problems. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
11
-
12
Bundle Sorting Mobile Application
Published 2020“…The worker or user just used the camera that has an image processing algorithm to do the sorting. The camera will be connected with the mobile devices that installed the fabric sorting application to capture all the information and quantity of garments by using the Bluetooth or server. …”
Get full text
Get full text
Final Year Project -
13
An ensemble learning method for spam email detection system based on metaheuristic algorithms
Published 2015“…Feature subset selection and classifier ensemble learning are familiar techniques with high ability to optimize above problems. Recently, various techniques based on different algorithms have been developed. …”
Get full text
Get full text
Thesis -
14
A hardware implementation of Rivest-Shamir-Adleman co-processor for resource constrained embedded systems
Published 2006“…This need is further fueled by the advent of mobile electronic devices like smart cards, mobile phones and hardware tokens. …”
Get full text
Get full text
Thesis -
15
Enhancing XSS vulnerability detection and removal in web applications using genetic algorithms
Published 2024“…Cross-site scripting (XSS) vulnerabilities are a major security threat for both desktop and mobile web applications. They occur due to lack of proper verification of the user inputs, which enables hackers to inject and execute malicious scripts in the web pages of an application. …”
Get full text
Get full text
Get full text
Thesis -
16
-
17
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
18
A study on obstacle detection for IoT based automated guided vehicle (AGV)
Published 2022“…Therefore, an IoT system is developed to allow a flexible wireless communication among mobile robots in an indoor industrial environment. …”
Get full text
Get full text
Get full text
Article -
19
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…An inappropriate selection of materials for engineering component would result in entire product failure which ultimately has a negative impact on the society. Several algorithms, methods and spreadsheets are being proposed by various researchers in this field to improve materials selection. …”
Get full text
Get full text
Thesis -
20
