Search Results - (( java implementation mechanism algorithm ) OR ( program binary programming algorithm ))
Search alternatives:
- implementation mechanism »
- java implementation »
- mechanism algorithm »
- binary programming »
- program binary »
-
1
-
2
-
3
-
4
-
5
Solving Sudoku puzzles in Binary Integer Linear Programming using Branch and Bound algorithm / Ahida Waliyyah Ahmad Fuad
Published 2024“…This study explores the application of a Binary Integer Linear Programming (BILP) model combined with the Branch and Bound (B&B) algorithm to solve Sudoku puzzles. …”
Get full text
Get full text
Thesis -
6
-
7
RSA Encryption & Decryption using JAVA
Published 2006“…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
Get full text
Get full text
Final Year Project -
8
-
9
Graph coloring program of exam scheduling modeling based on bitwise coloring algorithm using python
Published 2022“…The researchers develop a graph coloring algorithm by considering some of the graph vertices to be binary numbers. …”
Get full text
Get full text
Get full text
Article -
10
Surveillance camera placement optimization using Particle Swarm Optimization (PSO) algorithm and Mixed-Integer Linear Programming (MILP) model / `Ain Safia Roslan
Published 2024“…MATLAB was chosen as the primary software due to its robust capabilities in numerical computing and optimization, enabling efficient implementation and analysis of both algorithms. The study applied these optimization techniques to various Binary Integer Programming (BIP) matrix sizes (11×9, 39×24, and 172×49) representing the same 2D layouts, to evaluate their performance in different spatial configurations. …”
Get full text
Get full text
Thesis -
11
A mathematical study on "additive technique" versus "branch and bound technique" for solving binary programming problem
Published 2018“…The model was illuminated by utilizing the Balas Algorithm through AT and Binary Programming through BBT.…”
Get full text
Get full text
Get full text
Conference or Workshop Item -
12
A Mathematical Study on “Additive Technique” Versus “Branch and Bound Technique” for Solving Binary Programming Problem
Published 2018“…The model was illuminated by utilizing the Balas Algorithm through AT and Binary Programming through BBT. © 2018 Institute of Physics Publishing. …”
Get full text
Get full text
Get full text
Article -
13
Optimizing the placement of fire department in Kulim using greedy heuristic and simplex method / Muhammad Abu Syah Mohd Suzaly
Published 2023“…The placement of fire stations is an important component in providing fire protection coverage. The binary integer programming (BIP) issue is a rare form of integer programming problem in which the value of variable xi is only 0 or 1. …”
Get full text
Get full text
Thesis -
14
Path planning algorithm for a car like robot based on MILP method
Published 2013“…The final phases are the design and build coalitions of linear programs and binary constraints to avoid collision with obstacles by Integer Mixed Linear Program (MILP). …”
Get full text
Get full text
Get full text
Get full text
Thesis -
15
Optimal water supply reservoir operation by leveraging the meta-heuristic Harris Hawks algorithms and opposite based learning technique
Published 2024“…To ease water scarcity, dynamic programming, stochastic dynamic programming, and heuristic algorithms have been applied to solve problem matters related to water resources. …”
Article -
16
-
17
Secure Image Steganography Using Encryption Algorithm
Published 2016“…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
Get full text
Get full text
Conference or Workshop Item -
18
Prevention And Detection Mechanism For Security In Passive Rfid System
Published 2013“…The correctness of the proposed protocol is demonstrated in a simulation model developed in JAVA TCP/IP socket. Next, the proposed protocol is implemented in RFID system including IAIK UHF Demo tag, TagSense Nano-UHF reader and back-end database. …”
Get full text
Get full text
Thesis -
19
-
20
Implementation of RIO in UMJaNetSim / Chan Chin We
Published 2004“…In this project, I will do some research on the recent TCP congestion control and avoidance mechanisms and implement one of the mechanisms into the Java Network Simulator (JaNetSim). …”
Get full text
Get full text
Thesis
