Search Results - (( program implementation mix algorithm ) OR ( java application towards algorithm ))

Refine Results
  1. 1

    Surveillance camera placement optimization using Particle Swarm Optimization (PSO) algorithm and Mixed-Integer Linear Programming (MILP) model / `Ain Safia Roslan by Roslan, `Ain Safia

    Published 2024
    “…This project explores the optimization of surveillance camera placements using Particle Swarm Optimization (PSO) and Mixed-Integer Linear Programming (MILP). PSO, inspired by the social behaviour of birds flocking or fish schooling, is a heuristic algorithm known for its flexibility and exploration capabilities. …”
    Get full text
    Get full text
    Thesis
  2. 2

    Final exam question paper data encryption and decryption using advance encryption standard / Khairul Nashran Nazari by Nazari, Khairul Nashran

    Published 2017
    “…AES in this research was implemented using 128- bit of key length and block size. …”
    Get full text
    Get full text
    Thesis
  3. 3

    Network game (Literati) / Chung Mei Kuen by Chung, Mei Kuen

    Published 2003
    “…This thesis steps towards developing a networked game, Literati game system that supporting two players at one time. …”
    Get full text
    Get full text
    Thesis
  4. 4
  5. 5

    Sequential and parallel multiple tabu search algorithm for multiobjective urban transit scheduling problems by Uvaraja, Vikneswary

    Published 2018
    “…A mixed integer programming models are formulated to represent the objectives. …”
    Get full text
    Get full text
    Thesis
  6. 6
  7. 7

    Reverse logistics network optimizing by genetic algorithm: a case study of automotive wiring harnesses by Sadrnia, Abdolhossein, Ismail, Napsiah, Mohd Ariffin, Mohd Khairol Anuar, Zulkifli, Norzima, Boyer, Omid

    Published 2014
    “…With regards to the complexity of the reverse logistics network, traditional method cannot be implemented for solving them. Thus, an evolutionary algorithm based genetic algorithm (GA) is applied as a solution methodology to solve mixed integer linear programming model and find the optimum solution. …”
    Get full text
    Get full text
    Get full text
    Article
  8. 8

    Adoption of machine learning algorithm for analysing supporters and non supporters feedback on political posts / Ogunfolajin Maruff Tunde by Ogunfolajin Maruff , Tunde

    Published 2022
    “…This thesis is based on the application of sentiment classification algorithm to tweet data with the goal of classifying messages based on the polarity of sentiment towards a particular topic (or subject matter). …”
    Get full text
    Get full text
    Get full text
    Thesis
  9. 9
  10. 10
  11. 11

    OPTIMIZATION OF TWO FISH ENCRYPTION ALGORITHM ON FPGA by DORE RAJA, ANAND A RAJA

    Published 2004
    “…Both Design I and Design 2 were written using VHDL, simulated using ALDEC, synthesized using XILINX Synthesizing Tools, implemented using XILINX ISE6.2i implementation tools and download onto the Spartan 2 FPGA board using BEDLOAD utility program. …”
    Get full text
    Get full text
    Final Year Project
  12. 12
  13. 13

    Optimization Of Twofish Encryption Algorithm On FPGA by Raja, Ananda Raja Dore, Zain Ali, Noohul Basheer, Hussin, Fawnizu Azmadi

    Published 2005
    “…Both Design I and Design 2 were written using VHDL, simulated using ALDEC, synthesized using XILINX Synthesizing Tools, implemented using XILINX ISE6.2i implementation tools and download onto the Spartan 2 FPGA board using BEDLOAD utility program. …”
    Get full text
    Conference or Workshop Item
  14. 14
  15. 15
  16. 16

    Solving a multi-period inventory routing problem with stochastic unstationary demand rates by Muhammad Khodri Harahap, Afif Zuhri

    Published 2022
    “…The computational results show that the algorithms that implement this modified formulation can achieve a better optimization result. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17

    Modified ant colony optimization algorithms for deterministic and stochastic inventory routing problems / Lily Wong by Lily , Wong

    Published 2018
    “…The computational results show that the algorithms which implement this new formulation are able to produce better solutions. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Enhancing obfuscation technique for protecting source code against software reverse engineering by Mahfoudh, Asma

    Published 2019
    “…The proposed technique can be enhanced in the future to protect games applications and mobile applications that are developed by java; it can improve the software development industry. …”
    Get full text
    Get full text
    Thesis
  19. 19

    Network monopoly / Tan Kean Yeap by Tan , Kean Yeap

    Published 2002
    “…With the powerful networking features of Java, it is expected that this project would produce a "real" game engine. …”
    Get full text
    Get full text
    Thesis
  20. 20

    A study on the significance of backlash width values to the performance of the MIQP-based design of MPC by H., Zabiri, Y., Samyudia

    Published 2005
    “…An approach that has been recently developed involved the integration of the actuator backlash within the framework of Model Predictive Control (MPC) controller algorithm itself. This method, so-called the Mixed-Integer Quadratic Programming (MIQP)-based design of MPC, has been shown through extensive simulation on industrial case studies to be able to handle efficiently actuator saturation and actuator backlash nonlinearities simultaneously. …”
    Get full text
    Get full text
    Conference or Workshop Item