Search Results - (( java location based algorithm ) OR ( program implementation mix algorithm ))
Search alternatives:
- program implementation »
- implementation mix »
- mix algorithm »
- java »
-
1
Surveillance camera placement optimization using Particle Swarm Optimization (PSO) algorithm and Mixed-Integer Linear Programming (MILP) model / `Ain Safia Roslan
Published 2024“…This project explores the optimization of surveillance camera placements using Particle Swarm Optimization (PSO) and Mixed-Integer Linear Programming (MILP). PSO, inspired by the social behaviour of birds flocking or fish schooling, is a heuristic algorithm known for its flexibility and exploration capabilities. …”
Get full text
Get full text
Thesis -
2
-
3
Group formation using genetic algorithm
Published 2009“…However, due to lack of programming skills especially in Java programming language and the inability to have meetings frequently among the group members,most of the students’ software project cannot be delivered successfully.To solve this problem, systematic group formation is one of the initial factors that should be considered to ensure that every group consists of quality individuals who are good in Java programming and also to ensure that every group member in a group are staying closer to each other.In this research, we propose a method for group formation using Genetic Algorithms, where the members for each group will be generated based on the students’ programming skill and location of residential colleges.…”
Get full text
Get full text
Get full text
Get full text
Monograph -
4
Multi-floor indoor location estimation system based on wireless local area network
Published 2007“…The most probable match is selected and returned as estimated location based on Bayesian filtering algorithm. Estimated location is reported as physical location and symbolic location. …”
Get full text
Get full text
Thesis -
5
-
6
Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari
Published 2017“…AES in this research was implemented using 128- bit of key length and block size. …”
Get full text
Get full text
Thesis -
7
Counting roots of the Polynomial systems by using mixed volume of the Newton polytopes / Nur Suhailah Norazhar, Nur Ain Sofiya Zainuri and Nor Suhada Mohd Rosdi
Published 2024“…The results from the Maple program are compared to confirm the root counting result using the mixed volume method. …”
Get full text
Get full text
Student Project -
8
Mathematical simulation for 3-dimensional temperature visualization on open source-based grid computing platform
Published 2009“…The development of this architecture is based on several programming language as it involves algorithm implementation on C, parallelization using Parallel Virtual Machine (PVM) and Java for web services development. …”
Get full text
Get full text
Get full text
Conference or Workshop Item -
9
Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems
Published 2018“…A mixed integer programming models are formulated to represent the objectives. …”
Get full text
Get full text
Thesis -
10
Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption
Published 2022“…Subsequently, this project embedded with a lightweight Geo-Encryption algorithm to preserve the privacy of real-time GPS location. …”
Get full text
Get full text
Get full text
Academic Exercise -
11
Reverse logistics network optimizing by genetic algorithm: a case study of automotive wiring harnesses
Published 2014“…With regards to the complexity of the reverse logistics network, traditional method cannot be implemented for solving them. Thus, an evolutionary algorithm based genetic algorithm (GA) is applied as a solution methodology to solve mixed integer linear programming model and find the optimum solution. …”
Get full text
Get full text
Get full text
Article -
12
-
13
OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA
Published 2004“…Both Design I and Design 2 were written using VHDL, simulated using ALDEC, synthesized using XILINX Synthesizing Tools, implemented using XILINX ISE6.2i implementation tools and download onto the Spartan 2 FPGA board using BEDLOAD utility program. …”
Get full text
Get full text
Final Year Project -
14
Optimization Of Twofish Encryption Algorithm On FPGA
Published 2005“…Both Design I and Design 2 were written using VHDL, simulated using ALDEC, synthesized using XILINX Synthesizing Tools, implemented using XILINX ISE6.2i implementation tools and download onto the Spartan 2 FPGA board using BEDLOAD utility program. …”
Get full text
Conference or Workshop Item -
15
-
16
-
17
Solving a multi-period inventory routing problem with stochastic unstationary demand rates
Published 2022“…The computational results show that the algorithms that implement this modified formulation can achieve a better optimization result. …”
Get full text
Get full text
Get full text
Get full text
Thesis -
18
Friendship Degree and Tenth Man Strategy: A new method for differentiating between erroneous readings and true events in wireless sensor networks
Published 2023“…The second stage will validate the voting process through a novel perspective based on the TMS. TMS will check the voters’ replies based on the event’s location. …”
Get full text
Get full text
Article -
19
Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong
Published 2018“…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
Get full text
Get full text
Get full text
Thesis -
20
Adaptive persistence layer for synchronous replication (PLSR) in heterogeneous system
Published 2011“…The PLSR architecture model, workflow and algorithms are described. The PLSR has been developed using Java Programming language. …”
Get full text
Get full text
Thesis
