Search Results - (( developing selection techniques algorithm ) OR ( java application a algorithm ))
Search alternatives:
- developing selection »
- selection techniques »
- java application »
- application a »
- a algorithm »
-
1
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
2
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
3
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005“…The other constraint is the student workload should be arranged less than three exams in a row. The examination timetabling problem at Kolej Universiti Teknologi Tun Hussein Onn (KUiTTHO) is introduced and the prototype has been developed using Java language. …”
Get full text
Get full text
Thesis -
4
Improving Class Timetabling using Genetic Algorithm
Published 2006“…This paper reports the power fill techniques using GA in scheduling. Class timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Get full text
Thesis -
5
Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO
Published 2005“…The other constraint is the student workload should be arranged less than three exams in a row. The examination timetabling problem at Kolej Universiti Teknologi Tun Hussein Onn (KUiTTHO) is introduced and the prototype has been developed using Java language. …”
Get full text
Get full text
Get full text
Thesis -
6
Reducing of Inconsistent Data using Fuzzy Multi Attribute Decision Making for Accessing Data from Database
Published 2013“…An application was developed using java and oracle technology. …”
Get full text
Get full text
Article -
7
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
Get full text
Get full text
Get full text
Article -
8
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
9
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. …”
Get full text
Get full text
Thesis -
10
-
11
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
12
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
13
Variable block based motion estimation using hexagon diamond full search algorithm (HDFSA) via block subtraction technique
Published 2015“…Overall, the developed algorithms have similar PSNR value and lower average search point compared to superior algorithms. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
14
A meta-heuristics based input variable selection technique for hybrid electrical energy demand prediction models
Published 2017“…The combined influence of the genetic algorithm and correlation analysis are used in this technique. …”
Get full text
Get full text
Article -
15
Optimisation of Environmental Risk Assessment Architecture using Artificial Intelligence Techniques
Published 2024“…The proposed architecture is implemented in the form of two models, namely, the neuro-fuzzy risk assessment model and the safe path selection model. Fuzzy arithmetic operations on fuzzy numbers and artificial neural networks with a back-propagation learning algorithm were used to represent the structure of the neuro-fuzzy risk assessment model, whereas genetic algorithms were used to develop the safe path selection model. …”
thesis::doctoral thesis -
16
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
17
Kernel and multi-class classifiers for multi-floor wlan localisation
Published 2016“…For floor localisation, the strategy is based on developing the algorithm to determine the floor by utilising fingerprint clustering technique. …”
Get full text
Get full text
Thesis -
18
Successor selection for Ant Colony Optimization technique algorithm / Muhammad Iskandar Isman
Published 2017“…ACO algorithm is the best solution because it included the optimization technique to optimized the result based on the data criteria needs. …”
Get full text
Get full text
Thesis -
19
Development of web based learning content of animation algorithm on searching and sorting techniques / Nur Linda Abdi Nur
Published 2007“…The objectives of this project is to develop self-learning environment in learning searching and sorting algorithm, enhance understanding of student in learning searching and sorting technique and to apply web-based learning in computer science subject, which focus on courses that use searching and sorting algorithm.…”
Get full text
Get full text
Thesis -
20
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis
