Search Results - (( developing visit control algorithm ) OR ( java implication based algorithm ))

  • Showing 1 - 9 results of 9
Refine Results
  1. 1

    Development of a Web Access Control Technique Based User Access Behavior by Abdelrahman, Selmaelsheikh

    Published 2004
    “…This thesis discusses about designs and develops techniques and algorithms for performing web access control. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Cohesive token passing algorithm utilizing software agents by Abdulrazzak, A. Fua’ad, Subramaniam, Shamala

    Published 2010
    “…A complete circulation of the ring is defined upon all nodes being visited at least once. Discrete-event simulation models were developed and deployed for the purpose of performance analysis. …”
    Get full text
    Get full text
    Article
  5. 5

    Deterministic and stochastic inventory routing problems with backorders using artificial bee colony / Huda Zuhrah Ab Halim by Huda Zuhrah , Ab Halim

    Published 2019
    “…The DSIRP is modeled as stochastic dynamic programming and solved using a matheuristic, enhanced hybrid rollout algorithm. The enhanced algorithm embeds additional controls generated using ABC. …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    Modelling of geometric correction and relative radiometric normalization for near equatorial earth observation satellite images by Al-Razzaq Abd, Hayder Abd

    Published 2015
    “…The generated control points are refined by using the sum of absolute difference algorithm (SAD), with the help of an empirical threshold and control point locations to avoid obtaining inaccurate control points. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Incremental learning for large-scale stream data and its application to cybersecurity by Ali, Siti Hajar Aminah

    Published 2015
    “…For this purpose, we develop an autonomous system that learns from double-bounce emails collected at a mail server. …”
    Get full text
    Get full text
    Thesis