Search Results - (( java application modified algorithm ) OR ( problem implementation 5s algorithm ))

Refine Results
  1. 1
  2. 2
  3. 3

    Comparative implementation of the benchmark Dejong 5 function using flower pollination algorithm and the African buffalo optimization by Odili, Julius Beneoluchi, Noraziah, Ahmad

    Published 2019
    “…We conclude from this study that in implementing FPA and ABO for solving the benchmark Dejong 5 problem, a population of 10 search agents and using 1000 iterations can produce effective and efficient outcomes.…”
    Get full text
    Get full text
    Get full text
    Article
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10

    Prevention And Detection Mechanism For Security In Passive Rfid System by Khor, Jing Huey

    Published 2013
    “…A GUI is created in a form of JAVA application to display data detected from tag. …”
    Get full text
    Get full text
    Thesis
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Fpga Implementation Of Metaheuristic Optimization Algorithm by Phuah, Soon Eu

    Published 2022
    “…Metaheuristic algorithms are gaining popularity amongst researchers due to their ability to solve nonlinear optimization problems as well as the ability to be adapted to solve a variety of problems. …”
    Get full text
    Get full text
    Undergraduates Project Papers
  16. 16

    QoS routing for multiple additive QoS parameters using genetic algorithm by Yussof S., See O.H.

    Published 2023
    “…The algorithm was implemented and tested on a 55 mesh network to test for its effectiveness. …”
    Conference paper
  17. 17

    FPGA implementation of metaheuristic optimization algorithm by Nurul Hazlina, Noordin, Phuah, Soon Eu, Zuwairie, Ibrahim

    Published 2023
    “…Metaheuristic algorithms are gaining popularity amongst researchers due to their ability to solve nonlinear optimization problems as well as the ability to be adapted to solve a variety of problems. …”
    Get full text
    Get full text
    Get full text
    Article
  18. 18

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  19. 19
  20. 20