Search Results - (( found selection problem algorithm ) OR ( java application design algorithm ))
Search alternatives:
- application design »
- selection problem »
- problem algorithm »
- java application »
- design algorithm »
- found selection »
-
1
RSA Encryption & Decryption using JAVA
Published 2006“…The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
2
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
3
Broadening selection competitive constraint handling algorithm for faster convergence
Published 2020“…The proposed algorithm is found to provide better solutions and achieve significantly faster convergence in most of the problems. …”
Get full text
Get full text
Article -
4
Static and self-scalable filter range selection algorithms for peer-to-peer networks
Published 2011“…Two multiple selection algorithm, which are known as “static filter range selection algorithm” and “self-scalable selection algorithm” are proposed. …”
Get full text
Get full text
Thesis -
5
-
6
Tourist Trip Design Problem with user preference and popularity: a case study of Langkawi Island / Nabilah Anuar Ahmad and Huda Zuhrah Ab. Halim
Published 2023“…This study proposed enhancement in the greedy algorithm approach (Benjamin et al., 2019). A greedy algorithm solves a problem that selects the most appropriate option based on the current situation. …”
Get full text
Get full text
Book Section -
7
Audio Streaming System Using Real-Time Transport Protocol Based on Java Media Framework
Published 2004“…Java Media Framework library and the RTP protocol for audio transmission were used as development tools.The developed system designed in this thesis together with experimental results proved that the system could be implemented successfully. …”
Get full text
Get full text
Thesis -
8
Review of Nature Inspired Metaheuristic Algorithm Selection for Combinatorial t-way Testing
Published 2022“…Metaheuristic algorithm is a very important area of research that continuously improve in solving optimization problems. …”
Get full text
Get full text
Article -
9
Network reconfiguration and control for loss reduction using genetic algorithm
Published 2010“…The proposed solution to this problem is based on a general combinatorial optimization algorithm known as Genetic Algorithm, and the load flow equations in distribution network. …”
Get full text
Get full text
Thesis -
10
-
11
Feature Selection using Binary Simulated Kalman Filter for Peak Classification of EEG Signals
Published 2018“…In this paper, another extension of SKF algorithm, which is called binary SKF (BSKF) algorithm, is applied for the same feature selection problem. …”
Get full text
Get full text
Conference or Workshop Item -
12
Clonal selection algorithm for the cryptanalysis of a simple substitution cipher
Published 2006“…The development of Clonal Selection Algorithm (CSA) is inspired by elements from clonal selection theories. …”
Get full text
Get full text
Conference or Workshop Item -
13
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…This research has achieved the result that meets the objective and found the best selection method that can be used to handle the similar problem with this research.…”
Get full text
Get full text
Thesis -
14
Design Of Robot Motion Planning Algorithm For Wall Following Robot
Published 2006Get full text
Get full text
Monograph -
15
Genetic Algorithms And Particle Swarm Optimization For Interference Minimization In Mobile Network Channel Assignment Problem
Published 2021“…GA with three variants in term of population selection – roulette wheel selection (RWS), tournament selection (TS) and stochastic universal sampling (SUS) were studied, and then compared with classic PSO. …”
Get full text
Get full text
Get full text
Article -
16
Performance Enhancement Of Artificial Bee Colony Optimization Algorithm
Published 2013“…To overcome the problems, this research work has proposed few modified and new ABC variants; Gbest Influenced-Random ABC (GRABC) algorithm systematically exploits two different mutation equations for appropriate exploration and exploitation of search-space, Multiple Gbest-guided ABC (MBABC) algorithm enhances the capability of locating global optimum by exploiting so-far-found multiple best regions of a search-space, Enhanced ABC (EABC) algorithm speeds up exploration for optimal-solutions based on the best so-far-found region of a search-space and Enhanced Probability-Selection ABC (EPS-ABC) algorithm, a modified version of the Probability-Selection ABC algorithm, simultaneously capitalizes on three different mutation equations for determining the global-optimum. …”
Get full text
Get full text
Thesis -
17
-
18
Network game (Literati) / Chung Mei Kuen
Published 2003“…The main aspect of this thesis is to produce a networked gaming system, which process players. requested to play the game and enabling users to play the graphical game with people through the network. The algorithm design and implementation method must not only be workable, but also highly efficient in terms of execution speed and response time. …”
Get full text
Get full text
Thesis -
19
Monthly rainfall prediction model of Peninsular Malaysia using clonal selection algorithm
Published 2018“…Rainfall prediction is pertinent in order to solve many hydrological problems. The proposed Clonal Selection Algorithm (CSA) is one of the main algorithms in AIS, which inspired on Clonal selection theory in the immune system of human body that includes selection, hyper mutation, and receptor editing processes. …”
Get full text
Get full text
Get full text
Get full text
Article -
20
SANAsms: Secure short messaging system for secure GSM mobile communication
Published 2008“…The application is designed to satisfy the user friendly interfaces and intent to be used by the end user without having the advanced knowledge in mobile security. …”
Get full text
Get full text
Conference or Workshop Item
