Search Results - (( java implementation change algorithm ) OR ( strategic implementation using algorithm ))

Refine Results
  1. 1

    Strategic oscillation for exploitation and exploration of ACS algorithm for job scheduling in static grid computing by Alobaedy, Mustafa Muwafak, Ku-Mahamud, Ku Ruhana

    Published 2015
    “…Exploitation and exploration mechanisms are the main components in metaheuristics algorithms. These mechanisms are implemented explicitly in ant colony system algorithm.The rate between the exploitation and exploration mechanisms is controlled using a parameter set by the users of the algorithm. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  2. 2

    Automatic generation of content security policy to mitigate cross site scripting by Mhana, Samer Attallah, Din, Jamilah, Atan, Rodziah

    Published 2016
    “…The algorithm is implemented as a plugin. It does not interfere with the web application original code. …”
    Get full text
    Get full text
    Conference or Workshop Item
  3. 3

    Application of minimax algorithm in dots and boxes game by Tan, Ah Hwa

    Published 2025
    “…The methodology involved implementing the Minimax algorithm as the primary decision-making engine for the AI. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    An Educational Tool Aimed at Learning Metaheuristics by Kader, Md. Abdul, Jamaluddin, Jamal A., Kamal Z., Zamli

    Published 2020
    “…This tool can be an educational assistant for beginners to learn metaheuristic in theoretical lectures as well as practical sessions. Implemented with Java, this tool provides a friendly GUI for setting the parameters and display the result from where the learner can see how the selected algorithm converges for a particular problem solution. …”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  5. 5

    Data Hiding Techniques In Digital Images by Al Thloothi, Salah Ramadan

    Published 2003
    “…After all these studies, one of the algorithms in the masking technique is developed and implemented using JAVA program to embed message into true color image with a good quality and higher capacity. …”
    Get full text
    Get full text
    Thesis
  6. 6

    Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography by Naji, Ahmed Wathik, Zaidan, B.B., Hameed, Shihab A., O-Khalifa, Othman

    Published 2009
    “…The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. …”
    Get full text
    Get full text
    Get full text
    Article
  7. 7

    Talkout : Protecting mental health application with a lightweight message encryption by Gavin Teo Juen

    Published 2022
    “…The investigation of lightweight message encryption algorithms is conducted with systematic quantitative literature and experiment implementation in Java and Android running environment. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  8. 8

    Effects of strategic leadership, organizational innovativeness, information technology capability on effective strategy implementation by Palladan, Ahmad Aliyu

    Published 2017
    “…Partial Least Squares Method (PLS 2) algorithm and bootstrap techniques were used to test the study hypotheses. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9

    Route optimization using shortest path method / Muhamad Faisal Amin Shakri by Shakri, Muhamad Faisal Amin

    Published 2025
    “…This study investigated the implementation and comparison between well known shortest path method which are Dijkstra’s algorithm, Bellman-Ford, and A* algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10

    Dam haji game using A* search algorithm / Siti Farah Najwa Mukhlis by Mukhlis, Siti Farah Najwa

    Published 2017
    “…Therefore many research have been done to develop this type of computer game by using the Al techniques. In Dam Haji game, the goal is to find the optimal movement to make, so A* algorithm, which is a pathfinding algorithm is used. …”
    Get full text
    Get full text
    Thesis
  11. 11

    An Information Retrieval Algorithm to Extract Influential Factors by Nabilah Filzah, Mohd Radzuan

    Published 2012
    “…This indicates that the algorithm was able to produce a good model. The extraction algorithm developed showed that influencial factors produced could be used as guideline for companies to monitor and strategize ways for business improvement.…”
    Get full text
    Get full text
    Get full text
    Thesis
  12. 12

    Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system by Beg, Abul Hashem

    Published 2011
    “…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
    Get full text
    Get full text
    Thesis
  13. 13

    Predicting sales trends for school cooperative using Market Basket Analysis by Azeman, Nur Itqan Mardhiah

    Published 2025
    “…This study explored applying Market Basket Analysis using the FP-Growth algorithm to boost sales projection and operational proficiency at a school cooperative. …”
    Get full text
    Get full text
    Student Project
  14. 14

    Traffic management algorithms for LEO satellite networks by Huyop @ Ayop, Fahrul Hakim

    Published 2016
    “…In order to evaluate the proposed algorithm, a series of experiments to implement Discrete Event Simulation (DES) of a LEO satellite network by using ns-2 and C/C++ are conducted. …”
    Get full text
    Get full text
    Get full text
    Thesis
  15. 15

    Advances in metaheuristics: Applications in engineering systems by Ganesan, T., Vasant, P., Elamvazuthi, I.

    Published 2016
    “…It also includes discussions on the potential improvement of algorithmic characteristics via strategic algorithmic enhancements. …”
    Get full text
    Get full text
    Book
  16. 16

    Efficient relay placement algorithm using landscape aware routing (erpalar) by Onabajo, Olawale Olusegun

    Published 2011
    “…Main contribution of ERP ALAR include user-centered, cheap, rugged and improved network access system through the following inputs: 3D implementation that takes care of landscape structures such as mountains and hills which is a common phenomenon in rural regions; extension of the current network coverage reach through the use of wireless relays; strategic deployment plan for the rural population through phase-by-phase deployment; cheap and affordable hardware implementation to minimize overall investment cost; and use of rugged WiFi hardware (IEEE 802.11 b) to minimize attention required on maintenance. …”
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18

    Harris Hawk Optimization-Based Deep Neural Networks Architecture for Optimal Bidding in the Electricity Market by Kavita Jain, Muhammed Basheer Jasser, Muzaffar Hamzah, Akash Saxena, Ali Wagdy Mohamed

    Published 2022
    “…The state-of-the-art frameworks used for simulating strategic bidding decisions in deregulated electricity markets (EM’s) in this article are bi-level optimization and neural networks. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    A wireless interference-aware internet-of-things gateway placement framework with genetic algorithm approach by Kong, Zan Wai

    Published 2022
    “…Gateway placement optimization is implemented to strategically placing the IoT gateways, aiming to fulfil different technical requirements on top of minimizing the number of gateway. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  20. 20

    Towards Wind Energy-based Charging Stations: A Review of Optimization Methods by Alhasan A.M.W., Umar D.A., Alkawsi G., Alkahtani A.A., Alomari M.A., Aris H.

    Published 2024
    “…Researchers engage diverse strategies and methodologies in the realm of sizing and optimization, encompassing a spectrum of algorithmic implementations and software solutions. …”
    Article