Search Results - (( java implementation models algorithm ) OR ( programming problem function algorithm ))*

Refine Results
  1. 1

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  3. 3

    Evolutionary cost-cognizant regression test case prioritization for object-oriented programs by Bello, AbdulKarim

    Published 2019
    “…Therefore, this study proposed a cost-cognizant TCP approach for object-oriented software that uses path-based integration testing to identify the possible execution path extracted from the Java System Dependence Graph (JSDG) model of the source code using forward slicing technique. …”
    Get full text
    Get full text
    Thesis
  4. 4

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Optimization of blood vessel detection in retina images using multithreading and native code for portable devices by Tran, Duc Ngoc, Hussin, Fawnizu Azmadi, Yusoff, Mohd Zuki

    Published 2013
    “…The performance of Java programming model and native programming model are compared with respect to the execution time for blood vessel detection. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6

    A Toolkit for Simulation of Desktop Grid Environment by FOROUSHAN, PAYAM CHINI

    Published 2014
    “…A simulator for desktop grid environment has been developed using Java as the implementation language due to its wide popularity. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Analytical Approach for Linear Programming Using Barrier and Penalty Function Methods by Moengin, Parwadi

    Published 2003
    “…None of these methods used Lagrangian function as a tool to solve the problem. This raises a question why are we not using this to solve the linear programming problems. …”
    Get full text
    Get full text
    Thesis
  8. 8
  9. 9

    Some metaheuristic algorithms for solving multiple cross-functional team selection problems by Ngo, S.T., Jaafar, J., Izzatdin, A.A., Tong, G.T., Bui, A.N.

    Published 2022
    “…We introduced a method that combines a compromise programming (CP) approach and metaheuristic algorithms, including the genetic algorithm (GA) and ant colony optimization (ACO), to solve the proposed optimization problem. …”
    Get full text
    Get full text
    Article
  10. 10

    A Model for Evaluation of Cryptography Algorithm on UUM Portal by Norliana, Abdul Majid

    Published 2004
    “…The methodology used in this study begun with problem identification, requirement identification, analysed the model process and design the simulation model. The simulation model was developed using Active Server Page, JavaScript and SQL 7.0 as database. …”
    Get full text
    Get full text
    Get full text
    Thesis
  11. 11

    On network flow problems with convex cost by Nguyen, V.A., Tan, Y. P.

    Published 2004
    “…To address this problem, we derive the optimality conditions for minimising convex and differentiable cost functions, and devise an algorithm based on the primal-dual algorithm commonly used in linear programming. …”
    Get full text
    Get full text
    Get full text
    Article
  12. 12

    Secure Image Steganography Using Encryption Algorithm by Siti Dhalila, Mohd Satar, Roslinda, Muda, Fatimah, Ghazali, Mustafa, Mamat, Nazirah, Abd Hamid, An, P.K

    Published 2016
    “…A system based on the proposed algorithm will be implemented using Java and it will be more secured due to double-layer of security mechanisms which are RSA and Diffie-Hellman.…”
    Get full text
    Get full text
    Conference or Workshop Item
  13. 13

    System program management environment in cloud computing using hybrid Genetic Algorithm and Moth Flame Optimization (GA-MFO) by Mohd Erwan Mazalan

    Published 2022
    “…The minimization of system execution and transfer time in the proposed algorithm are considered as objective functions. The experimental testing of the proposed algorithm are considered as objective functions. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  14. 14

    A combined filter line search and trust region method for nonlinear programming by Chin, Choong Ming, Halim, Abdul, Rashid, A. H. A., Nor, K. M.

    Published 2006
    “…A framework for solving a class of nonlinear programming problems via the filter method is presented. …”
    Get full text
    Article
  15. 15
  16. 16

    Fuzzy modeling using Bat Algorithm optimization for classification by Noor Amidah, Ahmad Sultan

    Published 2018
    “…In order to solve it, Bat Algorithm method is implement in to optimization method in fuzzy modeling for classification. …”
    Get full text
    Get full text
    Get full text
    Undergraduates Project Papers
  17. 17

    A Feature Ranking Algorithm in Pragmatic Quality Factor Model for Software Quality Assessment by Ruzita, Ahmad

    Published 2013
    “…This thesis describes original research in the field of software quality model by presenting a Feature Ranking Algorithm (FRA) for Pragmatic Quality Factor (PQF) model. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    The application of genetic algorithm to solve unit commitment problem/ Zuhairi Baharudin by Baharudin, Zuhairi

    Published 1998
    “…Due to large variety of constraints to be satisfied a proper fitness function of the GA is built. MATLAB program is used to solve the unit commitment problems and to represent the fitness function of die GA.…”
    Get full text
    Get full text
    Thesis
  19. 19

    A comparative study of multi-objective optimal power flow based on particle swarm, evolutionary programming, and genetic algorithm by Kahourzade, S., Mahmoudi, A., Mokhlis, Hazlie

    Published 2015
    “…This study presents the programming results of the nine essential single-objective and multi-objective functions of OPF problem. …”
    Get full text
    Get full text
    Get full text
    Article
  20. 20

    An improved grey wolf with whale algorithm for optimization functions by Asgher, Hafiz Maaz

    Published 2022
    “…The performance of the proposed algorithm is tested and evaluated on five benchmarked unimodal and five multimodal functions. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis