Search Results - (( programming practice tool algorithm ) OR ( java application optimized algorithm ))
Search alternatives:
- programming practice »
- optimized algorithm »
- java application »
- tool algorithm »
- practice tool »
-
1
Optimization of blood vessel detection in retina images using multithreading and native code for portable devices
Published 2013Get full text
Get full text
Conference or Workshop Item -
2
Performance evaluation of real-time multiprocessor scheduling algorithms
Published 2016“…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
Get full text
Get full text
Conference or Workshop Item -
3
Route Optimization System
Published 2005“…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
Get full text
Get full text
Final Year Project -
4
-
5
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…Enhance hybrid genetic algorithm and particle Swarm optimization are developed to select the optimal device in either fog or cloud. …”
Get full text
Get full text
Article -
6
Ant colony optimization algorithm for load balancing in grid computing
Published 2012Get full text
Get full text
Get full text
Monograph -
7
-
8
Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT
Published 2006“…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
Get full text
Get full text
Thesis -
9
-
10
Examination timetabling using genetic algorithm case study: KUiTTHO
Published 2005“…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
Get full text
Get full text
Thesis -
11
Automatic security evaluation of SPN-structured block cipher against related-key differential using mixed integer linear programming
Published 2019“…The extended MILP technique is able to provide an automatic security estimation tool by giving accurate results. Overall, it is applicable to an extensive variety of block cipher algorithm that makes it an adaptable tool for industrial purposes and scholarly research.…”
Get full text
Get full text
Get full text
Article -
12
Examination Timetabling Using Genetic Algorithm Case Study : KUiTTHO
Published 2005“…Genetic Algorithm (GA) is one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis -
13
Metaheuristic Algorithms Based on Compromise Programming for the Multi-Objective Urban Shipment Problem
Published 2022“…We evaluated the effectiveness of the proposed algorithm with the Tabu Search algorithm and the original genetic algorithm on the tested dataset. …”
Get full text
Get full text
Article -
14
Improving Class Timetabling using Genetic Algorithm
Published 2006“…We have targeted the research on class timetabling problem. Hence, Genetic Algorithm (GA) is used as one of the most popular optimization solutions. …”
Get full text
Get full text
Get full text
Thesis -
15
-
16
Parallel distributed genetic algorithm development based on microcontrollers framework
Published 2023Conference paper -
17
Features selection for intrusion detection system using hybridize PSO-SVM
Published 2016“…Hybridize Particle Swarm Optimization (PSO) as a searching algorithm and support vector machine (SVM) as a classifier had been implemented to cope with this problem. …”
Get full text
Get full text
Thesis -
18
Scheduling of batch process plant / Abdul Aziz Abu Bakar
Published 1995“…By using Turbo Pascal programming language, major programs are linked and displayed. …”
Get full text
Get full text
Student Project -
19
AI recommendation penetration testing tool for cross-site scripting: support vector machine algorithm
Published 2025“…The SVM algorithm, a supervised learning model, plays a crucial role in improving the efficiency of tool selection, ultimately enhancing the speed and adaptability of vulnerability detection processes. …”
Get full text
Get full text
Get full text
Article -
20
AI recommendation penetration testing tools for password attacks: random forest
Published 2025“…This project developed an AI-based recommendation system using the Random Forest algorithm to address the complexities of selecting appropriate penetration testing tools for password attacks. …”
Get full text
Get full text
Get full text
Article
