Search Results - (( simulation optimization drops algorithm ) OR ( java _ implementation algorithm ))

Search alternatives:

Refine Results
  1. 1

    IWDSA: a hybrid Intelligent Water Drops with a Simulated Annealing for the localization improvement in wireless sensor networks by Gumaida, Bassam, Ibrahim, Adamu Abubakar

    Published 2024
    “…The proposed algorithm, named Intelligent Water Drops with Simulated Annealing (IWDSA), combines two powerful optimization methods: Intelligent Water Drops (IWD) and Simulated Annealing (SA). …”
    Get full text
    Get full text
    Get full text
    Article
  2. 2
  3. 3

    Vehicle pick-up and drop-off schedule optimization in a university setting by Teo, Chun Kit

    Published 2024
    “…Lateness will be removed using a lateness waiting time rollback mechanism. A simulated annealing-based multi-directional iterative local search algorithm is employed for solution optimization. …”
    Get full text
    Get full text
    Final Year Project / Dissertation / Thesis
  4. 4

    Simulated Kalman Filter algorithms for solving optimization problems by Nor Hidayati, Abdul Aziz

    Published 2019
    “…In this research, two novel estimation-based metaheuristic optimization algorithms, named as Simulated Kalman Filter (SKF), and single-solution Simulated Kalman Filter (ssSKF) algorithms are introduced for global optimization problems. …”
    Get full text
    Get full text
    Thesis
  5. 5

    Solving University Examination Timetabling Problem Using Intelligent Water Drops Algorithm by Aldeeb, BA, Norwawi, NM, Al-Betar, MA, Bin Jali, MZ

    Published 2024
    “…IWD is a recent metaheuristic population-based algorithm belonging to swarm intelligent category which simulate river system. …”
    Proceedings Paper
  6. 6

    Dijkstra’s Algorithm for optimal recyclable waste collection system in Port Dickson / Nur Jazlina Mohd Iszairi, Aina Zulaika Md Ramli and Nursabrina Saifulbahri by Mohd Iszairi, Nur Jazlina, Md Ramli, Aina Zulaika, Saifulbahri, Nursabrina

    Published 2023
    “…A practical recyclable waste collection system would optimize the Waste Management System (WMS), especially in route choice from Depot to each drop-off collection center. …”
    Get full text
    Get full text
    Student Project
  7. 7

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…Today, with online marketing, banking, healthcare and other services, even the average householder is aware of encryption. The implementation of this project will be based on Rapid Application Design Methodology (RAD) and will be more focusing on research and finding, ideas and the implementation of the algorithm, and finally running and testing the algorithm. …”
    Get full text
    Get full text
    Final Year Project
  8. 8
  9. 9

    Inverse modeling of mass transferprocess in the RDC column by fuzzy approach by Maan, Normah, Talib, J., Arshad, K. A., Ahmad, T.

    Published 2003
    “…An algorithm of the fuzzy model is developed to simulate the above process. …”
    Get full text
    Get full text
    Book Section
  10. 10

    Optimized topology control in mobile IP networks using a new parametric routing algorithm by Gholizadeh, Somayyeh, Abdullah, Azizol, Othman, Mohamed, Mohd Hanapi, Zurina

    Published 2018
    “…Then, a new optimal routing algorithm is proposed to make up the node failure and changing Foreign Agent (FA). …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Mathematical modelling of mass transfer in a multi-stage rotating disc contactor column by Maan, Normah

    Published 2005
    “…Based on this formulation, a Mass Transfer of A Single Drop (MTASD) Algorithm was designed, followed by a more realistic Mass Transfer of Multiple Drops (MTMD) Algorithm which was later refined to become another algorithm named the Mass Transfer Steady State (MTSS) Algorithm. …”
    Get full text
    Get full text
    Thesis
  12. 12

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  13. 13

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  14. 14

    Benchmark simulator with dynamic environment for job scheduling in grid computing by Ku-Mahamud, Ku Ruhana

    Published 2014
    “…Characteristics of jobs and resources to be used in evaluating the performance of the scheduling algorithm must reflect the dynamic nature of real grid environment.Static models of jobs and resources cannot be used to generate jobs and resources in simulating the grid environment because of the dynamic nature of the grid.This paper presents a new graph representation of jobs and resources which is practical for hybrid metaheuristic model implementation such as ant colony optimization and genetic algorithm.A dynamic model that can generate jobs and resources similar to the jobs and resources in the real grid environment is also proposed.Jobs and resources may join in or drop out from the grid.Stochastic analysis is performed on the characteristics of jobs and resources.A simulator based on the dynamic expected time to compute, has been developed and can be used as a benchmark.The simulator can generate jobs and resources with the characteristics of jobs and resources in the real grid environment.This will facilitates the evaluation of dynamic job scheduling algorithm.…”
    Get full text
    Get full text
    Get full text
    Conference or Workshop Item
  15. 15

    Comparative study of meta-heuristics optimization algorithm using benchmark function by Ismail, I., Halim, A.H.

    Published 2017
    “…Therefore it is necessary to compare the performance of these algorithms with certain problem type. This paper compares 7 meta-heuristics optimization with 11 benchmark functions that exhibits certain difficulties and can be assumed as a simulation relevant to the real-world problems. …”
    Get full text
    Get full text
    Article
  16. 16

    AUTOMATED MODEL GENERATION OF FSM AND NUSMV MODEL FROM RSA JAVA SOURCE CODE FOR MODEL CHECKING by SALLEH AL-HUMAIKANI, MOHAMMED ABDULQAWI

    Published 2021
    “…RSA is one of these encryption algorithms that have been implemented in security systems. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  18. 18

    Enhanced Intelligent Water Drops Algorithm for University Examination Timetabling Problems by Bashar AbedAl Mohdi Talal AlDeeb

    Published 2024
    “…The main motivations for investigating IWD algorithm are: (i) IWD has been successfully employed to solve many optimization problems. …”
    thesis::doctoral thesis
  19. 19

    Fair bandwidth distribution marking and scheduling algorithm in network traffic classification by Al-Kharasani, Ameen Mohammed Abdulkarem

    Published 2019
    “…Finally, propose a new method of obtaining optimal parameters dropping functions for Random Early Detection (RED) algorithm. …”
    Get full text
    Get full text
    Thesis
  20. 20