Search Results - (( java implication based algorithm ) OR ( programming services effectiveness algorithm ))
Search alternatives:
- services effectiveness »
- programming services »
- implication based »
- java implication »
-
1
Schedule of tour guide using genetic algorithm / Nur Aishah Rosli
Published 2017Get full text
Get full text
Thesis -
2
-
3
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…This technique is then compared to DES, 3DES and Blowfish to verify and measure the effectiveness of the AES. The results from this research have proved that the AES is very effective in terms of time taken to encrypt and decrypt documents, strength of the algorithm and the reliability of the program. …”
Get full text
Get full text
Thesis -
4
Formulating and solving stochastic truck and trailer routing problems using meta-heuristic algorithms / Seyedmehdi Mirmohammadsadeghi
Published 2015“…For solving TTRP, a variety of algorithms have been applied earlier but TTRPSD programming has not yet solved. …”
Get full text
Get full text
Get full text
Thesis -
5
Early detection and mitigation of DDoS attacks in software defined networks
Published 2018“…To detect and mitigate this attack at its early stages, an entropy-based DDoS attack detection and mitigation algorithm was proposed. The algorithm was written in Python programming language to be implementing on a POX controller. …”
Get full text
Get full text
Thesis -
6
Performance evaluation of corner effect in UMTS / Nurzaliza Ghazali
Published 2009Get full text
Get full text
Thesis -
7
Factors predicting health practitioners' awareness of UNHS program in Malaysian non-public hospitals
Published 2018“…Health practitioners' awareness is explained by program layout, human resource, and screening instrument with effect size (f2) of 0.065, 0.621, and 0.211 respectively, indicating that program layout, human resource, and screening instrument have small, large and medium effect size on health practitioners' awareness respectively. …”
Get full text
Get full text
Article -
8
Digital Quran With Storage Optimization Through Duplication Handling And Compressed Sparse Matrix Method
Published 2024thesis::doctoral thesis -
9
-
10
A Novel Integrating Between Tool Path Optimization Using An ACO Algorithm And Interpreter For Open Architecture CNC System
Published 2021“…This article proposes an effective methodology to reduce manufacturing time through the creation of quasioptimal G command sequences, based on initial machining codes derived from CAD/CAM Service-Oriented Architecture (SOA) software. …”
Get full text
Get full text
Get full text
Get full text
Article -
11
Security analysis of data transmission in an IoT based platform for telemedicine
Published 2021“…The Internet of Things offers an effective and increased job satisfaction when used for better services on the Internet. …”
Get full text
Get full text
Get full text
Article -
12
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…A mixed integer programming models are formulated to represent the objectives. …”
Get full text
Get full text
Thesis -
13
A headway and order scheme based mixed integer goal programming model for railway rescheduling / Zuraida Alwadood
Published 2017“…Service disruptions in rail transport services often lead to trains cancelations and delays. …”
Get full text
Get full text
Thesis -
14
Off-the-shelf indoor localization system using radio frequency for wireless local area network
Published 2018“…The location fingerprinting algorithm consists of two phases: offline phase and online phase. …”
Get full text
Get full text
Thesis -
15
Classification of strategies for solving programming problems using Aol sequence analysis
Published 2019Get full text
Get full text
Get full text
Conference or Workshop Item -
16
-
17
A multi-filter feature selection in detecting distributed denial-of-service attack
Published 2019“…Distributed Denial of Services (DDoS) has become the most intrusive security threat on the Internet. …”
Get full text
Get full text
Get full text
Get full text
Conference or Workshop Item -
18
Long-term rain attenuation probability and site diversity gain prediction formulas
Published 2007“…It includes the designing of algorithm flow which incorporated into MATLAB programming software. …”
Get full text
Get full text
Thesis -
19
-
20
A Confined Workforce Planning Model with Plugging for Service Organizations Using Network Flow Under Finite Horizon, Varying Demand Senario
Published 2015“…The aim of this study is to develop a user-friendly quantitative model to determine the magnitude of changes in workforce strength of a service industry to meet the varying demands, while maintaining a desired level of quality and cost effectiveness. …”
Get full text
Get full text
Get full text
Get full text
Thesis
