Search Results - (( java application using algorithm ) OR ( user selection techniques algorithm ))
Search alternatives:
- selection techniques »
- java application »
- using algorithm »
- user selection »
-
1
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
2
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005“…This paper reports the powerful techniques using GA in scheduling. Examination timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Thesis -
3
Improving Class Timetabling using Genetic Algorithm
Published 2006“…This paper reports the power fill techniques using GA in scheduling. Class timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Get full text
Thesis -
4
Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO
Published 2005“…This paper reports the powerful techniques using GA in scheduling. Examination timetabling problem is one of the applications in scheduling. …”
Get full text
Get full text
Get full text
Thesis -
5
The implications for ahybrid detection technique against malicious sqlattacks on web applications
Published 2025“…But the large number of available prevention techniques make the selection of the best solution a big challenge, because not every technique fit all types of web application, hence a one technique for all is another issue and a difficult task. …”
Get full text
Get full text
Get full text
Article -
6
A malware analysis and detection system for mobile devices / Ali Feizollah
Published 2017“…We then used feature selection algorithms and deep learning algorithms to build a detection model. …”
Get full text
Get full text
Get full text
Thesis -
7
Mitigation of shoulder-surfing attack on picture-based passwords using falsifying authentication methods / Por Lip Yee
Published 2012“…Two falsifying authentication methods using: (i) penup event and neighbouring connectivity manipulation; and (ii) partial password selection and metaheuristic randomisation algorithm methods, were proposed. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Get full text
Thesis -
8
RSA Encryption & Decryption using JAVA
Published 2006“…References and theories to support the research of 'RSA Encryption/Decryption using Java' have been disclosed in Literature Review section. …”
Get full text
Get full text
Final Year Project -
9
VISUALIZATION OF GENETIC ALGORITHM BASED ON 2-D GRAPH TO ACCELERATE THE SEARCHING WITH HUMAN INTERVENTIONS.
Published 2012“…This is difTerent from existing Interactive Genetic Algorithm in which selection and evaluation of solutions is done by the users. …”
Get full text
Get full text
Thesis -
10
-
11
Provider independent cryptographic tools
Published 2003Get full text
Get full text
Get full text
Monograph -
12
Enhancing the QoS performance for mobile station over LTE and WiMAX networks / Mhd Nour Hindia
Published 2015“…The selection is based on the user preferences since it uses a self-learning algorithm to determine triggers and handover thresholds dynamically. …”
Get full text
Get full text
Thesis -
13
-
14
Multi-user beamforming, fairness and device-to-device channel state information sharing in downlink non-orthogonal multiple access systems
Published 2021“…To this end, a fair user clustering algorithm with two stages is proposed, wherein the strong and weak users are selected in the first and second stages, respectively. …”
Get full text
Get full text
Thesis -
15
Channel selection strategies for co-existence between wimax and wifi
Published 2009“…This project study the spectrum co-existence between IEEE 802.16a and 802.11b network in the same un-licensed band using cognitive radio technique. A channel selection algorithm is proposed to improve the secondary user's throughput and avoid interference with primary user. …”
Get full text
Get full text
Thesis -
16
Optimized Cover Selection for Audio Steganography Using Multi-Objective Evolutionary Algorithm
Published 2023“…Existing embedding techniques depend on cover audio selected by users. …”
Get full text
Get full text
Get full text
Article -
17
Distributed learning based energy-efficient operations in small cell networks
Published 2023“…To achieve these goals, a cell selection algorithm is proposed that overcomes the issues of conflicts and load imbalance while reducing energy consumption. …”
Get full text
Get full text
Thesis -
18
Sports tournament scheduling using genetic algorithm / Hafeezur Syakir Abdul Motok@Mohd Ridzuan
Published 2020“…The purpose of this research is to analysed the algorithm techniques and illustrate how the technique solves these problems. …”
Get full text
Get full text
Thesis -
19
Selection of access network using cost function method in heterogeneous wireless network
Published 2014“…This method covers the weight distribution and cost factor techniques.The weight distribution is used to measure different weights for existing wireless network based on the user's preference and mobile terminal power.The cost factor technique is also used to identify the cost for performing handover target by considering every network parameters and its weight.Results obtained showed that the algorithm has the ability to increase user's satisfaction compared to other algorithms, which consistently choose one accessible network.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
20
