Search Results - (( java application optimization algorithm ) OR ( user computing can algorithm ))

Refine Results
  1. 1

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  2. 2
  3. 3
  4. 4

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  6. 6
  7. 7
  8. 8

    Restaurant locator using Djikstra Algorithm / Mohamad Aliff Hakimi Lukman Hakim by Lukman Hakim, Mohamad Aliff Hakimi

    Published 2017
    “…Dijkstra’s algorithm is the technique that can solve the problem by itself. …”
    Get full text
    Get full text
    Thesis
  9. 9

    Locust- inspired meta-heuristic algorithm for optimising cloud computing performance by Fadhil, Mohammed Alaa

    Published 2023
    “…This has led to a great migration of users to cloud computing from other modes of computing. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11

    Performance-aware cost-effective brokering and load balancing algorithms for data center in large scale cloud computing by Naha, Ranesh Kumar

    Published 2015
    “…It helps organization to reduce computing infrastructure cost. Incloud computing concept, cloud users can use computing resources according to their needs and requirements. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Phishing attack detection using machine learning method by Jupin, John Arthur

    Published 2019
    “…The development of computer networks today is increased rapidly. This can be shown based on the trend of every computer user around the world, whereby they need to connect their computer to the Internet. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  13. 13

    The shortest route of the potential companies for internship using Dijkstra’s Algorithm / Mohamad Khairul Ikhwan Mohd Radzi by Mohd Radzi, Mohamad Khairul Ikhwan

    Published 2017
    “…For the future work, this application can run on another platform so that the students who are not android users can used this application. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Task scheduling in cloud computing environment using hybrid genetic algorithm and bat algorithm by Muhammad Syahril Mohamad Sainal

    Published 2022
    “…It helps users to only pay for their usage. Cloud computing becomes one of the fastest-growing technologies since it can lower costs, higher efficiency, and scalability. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  15. 15
  16. 16
  17. 17

    Task scheduling in cloud computing environment using hybrid genetic algorithm and artificial bee colony by Mohd Izuddin Sipluk

    Published 2022
    “…At the end of the project, the author will attempt to suggest an algorithm that can be utilized to expand the present platform further. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  18. 18
  19. 19
  20. 20

    Review of the machine learning methods in the classification of phishing attack by Jupin, John Arthur, Sutikno, Tole, Mohd Arfian, Ismail, Mohd Saberi, Mohamad, Shahreen, Kasim, Deris, Stiawan

    Published 2019
    “…The development of computer networks today has increased rapidly. This can be seen based on the trend of computer users around the world, whereby they need to connect their computer to the Internet. …”
    Get full text
    Get full text
    Get full text
    Article