Search Results - (( java _ selection algorithm ) OR ( user computing using algorithm ))
Search alternatives:
- selection algorithm »
- using algorithm »
- user computing »
-
1
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
2
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
3
Optimal route checking using genetic algorithm for UiTM's bus services / Tengku Salman Fathi Tengku Jaafar
Published 2006“…Beside that, this research also has to fulfill the objective of find the comparison of the three types of selection methods which roulette wheel selection, tournament selection and rank selection. …”
Get full text
Get full text
Thesis -
4
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
Get full text
Get full text
Get full text
Academic Exercise -
5
Classroom finder system with student availability, space and time constraint
Published 2024“…Scrum methodology was selected for the development methodology of this project while the tools of HTML, CSS, JavaScript, Bootstrap, Jinja2 Template Engine, Flask, SQLite and VS Code are used in the development of this project. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
6
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…It consists of 3-stage procedures: feature ranking, feature selection and classification. Subsequently, an experimental evaluation of the proposed Multi-Filter Feature Selection (M2FS) method is performed by using the benchmark dataset, NSL-KDD and employed the J48 classification algorithm. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
7
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…The outcome of this study will add to the body of knowledge the most important and recent proposed solutions to mitigate SQL injection attack, in particular those based on machine learning algorithm…”
Get full text
Get full text
Get full text
Article -
8
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
9
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
10
Java based expert system for selection of natural fibre composite materials
Published 2013“…Computer oriented materials selection and knowledge-based expert systems are the prevailing approach in materials selection. …”
Get full text
Get full text
Get full text
Article -
11
Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim
Published 2017“…In network theory, it’s known as the shortest-path problem, and Dijkstra’s algorithm is usually used to solve it. Dijkstra’s algorithm is one of the classic shortest path search algorithms. …”
Get full text
Get full text
Thesis -
12
Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing
Published 2015“…It helps organization to reduce computing infrastructure cost. Incloud computing concept, cloud users can use computing resources according to their needs and requirements. …”
Get full text
Get full text
Thesis -
13
-
14
-
15
Phishing attack detection using machine learning method
Published 2019“…However, in this wide use of this computer network, the privacy of computer users is in danger. …”
Get full text
Get full text
Get full text
Undergraduates Project Papers -
16
-
17
Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm
Published 2022“…Genetic algorithm was widely used because of its accuracy and simplicity. …”
Get full text
Get full text
Get full text
Academic Exercise -
18
-
19
Enhancement of RSA Key Generation Using Identity
Published 2015Get full text
Get full text
Get full text
Book Chapter -
20
Movie recommendation system / Najwa Syamimie Hasnu
Published 2020Get full text
Get full text
Thesis
