Search Results - (( java implementation change algorithm ) OR ( strategic implementation using algorithm ))
Search alternatives:
- strategic implementation »
- implementation change »
- implementation using »
- java implementation »
- change algorithm »
- using algorithm »
-
1
Strategic oscillation for exploitation and exploration of ACS algorithm for job scheduling in static grid computing
Published 2015“…Exploitation and exploration mechanisms are the main components in metaheuristics algorithms. These mechanisms are implemented explicitly in ant colony system algorithm.The rate between the exploitation and exploration mechanisms is controlled using a parameter set by the users of the algorithm. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
2
Automatic generation of content security policy to mitigate cross site scripting
Published 2016“…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
Get full text
Get full text
Conference or Workshop Item -
3
Application of minimax algorithm in dots and boxes game
Published 2025“…The methodology involved implementing the Minimax algorithm as the primary decision-making engine for the AI. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
4
An Educational Tool Aimed at Learning Metaheuristics
Published 2020“…This tool can be an educational assistant for beginners to learn metaheuristic in theoretical lectures as well as practical sessions. Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
5
Data Hiding Techniques In Digital Images
Published 2003“…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
Get full text
Get full text
Thesis -
6
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
Published 2009“…The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. …”
Get full text
Get full text
Get full text
Article -
7
Talkout : Protecting mental health application with a lightweight message encryption
Published 2022“…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
Get full text
Get full text
Get full text
Academic Exercise -
8
Effects of strategic leadership, organizational innovativeness, information technology capability on effective strategy implementation
Published 2017“…Partial Least Squares Method (PLS 2) algorithm and bootstrap techniques were used to test the study hypotheses. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
9
Route optimization using shortest path method / Muhamad Faisal Amin Shakri
Published 2025“…This study investigated the implementation and comparison between well known shortest path method which are Dijkstra’s algorithm, Bellman-Ford, and A* algorithm. …”
Get full text
Get full text
Thesis -
10
Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis
Published 2017“…Therefore many research have been done to develop this type of computer game by using the Al techniques. In Dam Haji game, the goal is to find the optimal movement to make, so A* algorithm, which is a pathfinding algorithm is used. …”
Get full text
Get full text
Thesis -
11
An Information Retrieval Algorithm to Extract Influential Factors
Published 2012“…This indicates that the algorithm was able to produce a good model. The extraction algorithm developed showed that influencial factors produced could be used as guideline for companies to monitor and strategize ways for business improvement.…”
Get full text
Get full text
Get full text
Thesis -
12
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis -
13
Predicting sales trends for school cooperative using Market Basket Analysis
Published 2025“…This study explored applying Market Basket Analysis using the FP-Growth algorithm to boost sales projection and operational proficiency at a school cooperative. …”
Get full text
Get full text
Student Project -
14
Traffic management algorithms for LEO satellite networks
Published 2016“…In order to evaluate the proposed algorithm, a series of experiments to implement Discrete Event Simulation (DES) of a LEO satellite network by using ns-2 and C/C++ are conducted. …”
Get full text
Get full text
Get full text
Thesis -
15
Advances in metaheuristics: Applications in engineering systems
Published 2016“…It also includes discussions on the potential improvement of algorithmic characteristics via strategic algorithmic enhancements. …”
Get full text
Get full text
Book -
16
Efficient relay placement algorithm using landscape aware routing (erpalar)
Published 2011“…Main contribution of ERP ALAR include user-centered, cheap, rugged and improved network access system through the following inputs: 3D implementation that takes care of landscape structures such as mountains and hills which is a common phenomenon in rural regions; extension of the current network coverage reach through the use of wireless relays; strategic deployment plan for the rural population through phase-by-phase deployment; cheap and affordable hardware implementation to minimize overall investment cost; and use of rugged WiFi hardware (IEEE 802.11 b) to minimize attention required on maintenance. …”
Get full text
Get full text
Thesis -
17
Modified K-Nearest Neighborhood Algorithm For Optimal Selection Of Distribution Centre In The Disaster Relief Operation
Published 2024thesis::master thesis -
18
Harris Hawk Optimization-Based Deep Neural Networks Architecture for Optimal Bidding in the Electricity Market
Published 2022“…The state-of-the-art frameworks used for simulating strategic bidding decisions in deregulated electricity markets (EM’s) in this article are bi-level optimization and neural networks. …”
Get full text
Get full text
Get full text
Get full text
Get full text
Article -
19
A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach
Published 2022“…Gateway placement optimization is implemented to strategically placing the IoT gateways, aiming to fulfil different technical requirements on top of minimizing the number of gateway. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
20
Towards Wind Energy-based Charging Stations: A Review of Optimization Methods
Published 2024“…Researchers engage diverse strategies and methodologies in the realm of sizing and optimization, encompassing a spectrum of algorithmic implementations and software solutions. …”
Article
