Search Results - (( java implementation _ algorithm ) OR ( program binary programming algorithm ))
Search alternatives:
- java implementation »
- binary programming »
- program binary »
-
1
Embedded system for indoor guidance parking with Dijkstra’s algorithm and ant colony optimization
Published 2019“…The circuits have been designed by proteus, the microcontrollers have been programmed by micro C, and the Graphical User Interface (GUI) has been implemented in Java. …”
Get full text
Get full text
Thesis -
2
-
3
-
4
-
5
-
6
Solving Sudoku puzzles in Binary Integer Linear Programming using Branch and Bound algorithm / Ahida Waliyyah Ahmad Fuad
Published 2024“…This study explores the application of a Binary Integer Linear Programming (BILP) model combined with the Branch and Bound (B&B) algorithm to solve Sudoku puzzles. …”
Get full text
Get full text
Thesis -
7
-
8
-
9
Graph coloring program of exam scheduling modeling based on bitwise coloring algorithm using python
Published 2022“…The researchers develop a graph coloring algorithm by considering some of the graph vertices to be binary numbers. …”
Get full text
Get full text
Get full text
Article -
10
Surveillance camera placement optimization using Particle Swarm Optimization (PSO) algorithm and Mixed-Integer Linear Programming (MILP) model / `Ain Safia Roslan
Published 2024“…MATLAB was chosen as the primary software due to its robust capabilities in numerical computing and optimization, enabling efficient implementation and analysis of both algorithms. The study applied these optimization techniques to various Binary Integer Programming (BIP) matrix sizes (11×9, 39×24, and 172×49) representing the same 2D layouts, to evaluate their performance in different spatial configurations. …”
Get full text
Get full text
Thesis -
11
A mathematical study on "additive technique" versus "branch and bound technique" for solving binary programming problem
Published 2018“…The model was illuminated by utilizing the Balas Algorithm through AT and Binary Programming through BBT.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A Mathematical Study on “Additive Technique” Versus “Branch and Bound Technique” for Solving Binary Programming Problem
Published 2018“…The model was illuminated by utilizing the Balas Algorithm through AT and Binary Programming through BBT. © 2018 Institute of Physics Publishing. …”
Get full text
Get full text
Get full text
Article -
13
Optimizing the placement of fire department in Kulim using greedy heuristic and simplex method / Muhammad Abu Syah Mohd Suzaly
Published 2023“…The placement of fire stations is an important component in providing fire protection coverage. The binary integer programming (BIP) issue is a rare form of integer programming problem in which the value of variable xi is only 0 or 1. …”
Get full text
Get full text
Thesis -
14
Path planning algorithm for a car like robot based on MILP method
Published 2013“…The final phases are the design and build coalitions of linear programs and binary constraints to avoid collision with obstacles by Integer Mixed Linear Program (MILP). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
RSA Encryption & Decryption using JAVA
Published 2006“…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
Get full text
Get full text
Final Year Project -
16
Optimal water supply reservoir operation by leveraging the meta-heuristic Harris Hawks algorithms and opposite based learning technique
Published 2024“…To ease water scarcity, dynamic programming, stochastic dynamic programming, and heuristic algorithms have been applied to solve problem matters related to water resources. …”
Article -
17
Provider independent cryptographic tools
Published 2003“…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
Get full text
Get full text
Get full text
Monograph -
18
Direct approach for mining association rules from structured XML data
Published 2012“…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
Get full text
Get full text
Thesis -
19
AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING
Published 2021“…RSA is one of these encryption algorithms that have been implemented in security systems. …”
Get full text
Get full text
Thesis -
20
