Search Results - (( java application a algorithm ) OR ( based selection based algorithm ))
Search alternatives:
- java application »
- based selection »
- selection based »
- application a »
- a algorithm »
-
1
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Therefore, in this paper, we proposed Dynamic tasks scheduling algorithm based on attribute reduction with an enhanced hybrid Genetic Algorithm and Particle Swarm Optimization for optimal device selection. …”
Get full text
Get full text
Article -
2
Java based expert system for selection of natural fibre composite materials
Published 2013“…Computer oriented materials selection and knowledge-based expert systems are the prevailing approach in materials selection. …”
Get full text
Get full text
Get full text
Article -
3
Application of genetic algorithm and JFugue in an evolutionary music generator
Published 2025“…This project explores the application of Genetic Algorithms (GA) with JFugue, which is a Java-based music programming library to develop an Evolutionary Music Generator. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
Ant colony optimization algorithm for load balancing in grid computing
Published 2012“…EACO selects the resources based on the pheromone value on each resource which is recorded in a matrix form. …”
Get full text
Get full text
Get full text
Monograph -
5
Enhancement of Ant Colony Optimization for Grid Job Scheduling and Load Balancing
Published 2011“…EACO selects the resources based on the pheromone value on each resource which is recorded in a matrix form. …”
Get full text
Get full text
Get full text
Thesis -
6
Web-based expert system for material selection of natural fiber- reinforced polymer composites
Published 2015“…Finally, the developed expert system was deployed over the internet with central interactive interface from the server as a web-based application. As Java is platform independent and easy to be deployed in web based application and accessible through the World Wide Web (www), this expert system can be one stop application for materials selection.…”
Get full text
Get full text
Thesis -
7
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The selected methodology for the application development is based on prototyping methodology. …”
Get full text
Get full text
Final Year Project -
8
Resource management in grid computing using ant colony optimization
Published 2011“…Resources with high pheromone value are selected to process the submitted jobs.Global pheromone update is performed after completion processing the jobs in order to reduce the pheromone value of resources.A simulation environment was developed using Java programming to test the performance of the proposed EACO algorithm against other ant based algorithm, in terms of resource utilization.Experimental results show that EACO produced better grid resource management solution.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
9
Message based random variable length key encryption algorithm.
Published 2009“…In order to overcome analysis mentioned above a new algorithm is designed that is based on random numbers and also can defeat time and memory constraints. …”
Get full text
Get full text
Article -
10
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…We simulate our proposed algorithms using a Java based simulator that is purposedly built for Grid computing simulations. …”
Get full text
Get full text
Get full text
Thesis -
11
A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment
Published 2013“…The methodology used consists of theoretical study, design of formal framework on intelligent software quality, identification of Feature Ranking Technique (FRT), construction and evaluation of FRA algorithm. The assessment of quality attributes has been improved using FRA algorithm enriched with a formula to calculate the priority of attributes and followed by learning adaptation through Java Library for Multi Label Learning (MULAN) application. …”
Get full text
Get full text
Get full text
Thesis -
12
Input-output based relation combinatorial testing using whale optimization algorithm for generating near optimum number of test suite
Published 2025“…This research focuses on the Input-Output Based Relations (IOR) testing strategy, which optimizes the test suite size by selecting critical parameters and employing “don’t care” values for non-essential inputs. …”
Get full text
Get full text
Get full text
Article -
13
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…The project's expected outcome is a GPS-Based Physical Identity and Access Management System with the selected lightweight geo-encryption algorithm that can be used to support the control access and management operations of UMS security division.…”
Get full text
Get full text
Get full text
Academic Exercise -
14
Evolutionary Music; Composing Beats and Chords Progression
Published 2020“…This project focuses on delivering a JAVA application named “Evoluthm” with mainly the functions of generating chords progressions and beats. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
15
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. …”
Get full text
Get full text
Thesis -
16
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
Get full text
Get full text
Get full text
Article -
17
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
18
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
19
-
20
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project
