Search Results - (( security application scheduling algorithm ) OR ( java application optimization algorithm ))

Refine Results
  1. 1

    Smart student timetable planner by Wong, Xin Tong

    Published 2025
    “…Course data is managed in CSV format, parsed into JSON for fast processing, while sessionStorage and localStorage handle user data within active sessions. A Genetic Algorithm forms the core scheduling engine, generating optimized timetables that respect both hard constraints, such as avoiding clashes, and soft constraints, such as personal preferences.The final output of this project is a functional web-based timetable planner that successfully enhances scheduling efficiency, reduces the likelihood of errors, and improves the overall academic planning experience. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  2. 2
  3. 3

    OTS: an optimal tasks scheduling algorithm based on QoS in cloud computing network by Alhakimi, Mohammed Ameen, Latip, Rohaya

    Published 2019
    “…This study presents an optimal tasks scheduling algorithm by enhancing Max-Min algorithm. …”
    Get full text
    Get full text
    Article
  4. 4
  5. 5

    Performance evaluation of real-time multiprocessor scheduling algorithms by Alhussian, H., Zakaria, N., Abdulkadir, S.J., Fageeri, S.O.

    Published 2016
    “…These results suggests that optimal algorithms may turn to be non-optimal when practically implemented, unlike USG which reveals far less scheduling overhead and hence could be practically implemented in real-world applications. …”
    Get full text
    Get full text
    Conference or Workshop Item
  6. 6
  7. 7

    Multi-objective scientific workflow scheduling algorithm in multi-cloud environment for satisfying QoS requirements by Ramadhan, Mazen Farid Ebrahim

    Published 2022
    “…MOS-MWO can thus be applied in cloud-based applications to effectively schedule workflow while achieving significant improvement in the QoS satisfaction rate (QSR) to 4.8% compared with the multi-objective scheduling algorithm (MOS). …”
    Get full text
    Get full text
    Thesis
  8. 8

    Route Optimization System by Zulkifli, Abdul Hayy

    Published 2005
    “…After much research into the many algorithms available, and considering some, including Genetic Algorithm (GA), the author selected Dijkstra's Algorithm (DA). …”
    Get full text
    Get full text
    Final Year Project
  9. 9

    An optimal tasks scheduling algorithm based on QoS in cloud computing network by Alhakimi, Mohammed Ameen Mohammed Abdo

    Published 2017
    “…This study presents an optimal task scheduling algorithm by enhancing Max-Min and TS algorithm. …”
    Get full text
    Get full text
    Thesis
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15

    Fog-cloud scheduling simulator for reinforcement learning algorithms by Al-Hashimi, Mustafa Ahmed Adnan, Rahiman, Amir Rizaan, Muhammed, Abdullah, Hamid, Nor Asilah Wati

    Published 2023
    “…Fog computing is a popular choice for Internet of Things (IoT) applications, such as electricity, health, transportation, smart cities, security, and more. …”
    Get full text
    Get full text
    Article
  16. 16

    A security payment model for financial payment using mykad by Ahmad Zahari, Nurul Huda

    Published 2011
    “…ARSA will automatically change its security algorithm based on times and attacks. If there is no attack or intrusion detected, MPM will wait for the scheduled switching within 30 minutes. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  17. 17
  18. 18
  19. 19

    Computer Lab Timetabling Using Genetic Algorithm Case Study - Unit ICT by Abdullah, Amran

    Published 2006
    “…Genetic Algorithm is one of the most popular optimization solutions used in various applications such as scheduling. …”
    Get full text
    Get full text
    Thesis
  20. 20

    Efficient and secured compression and steganography technique in wireless sensor network by Tuama, Ammar Yaseen

    Published 2016
    “…The proposed solution comes with low complexity and is used to en- hance the security of the standard LSB algorithm by replacing an originally less secured sequential data hiding with a random pixel selection. …”
    Get full text
    Get full text
    Get full text
    Thesis