Solving security staff scheduling by using genetic algorithm
The scheduling problem has been studied for a few decades where many researchers have successfully solved scheduling using different approaches. However, in the new era, flexible working hours is the latest trend compared with the traditional way, fixed working hours. Therefore, in this research, a...
| Main Author: | Ang, Shin Yin |
|---|---|
| Format: | Thesis |
| Language: | English English English |
| Published: |
2021
|
| Subjects: | |
| Online Access: | http://eprints.uthm.edu.my/1091/ http://eprints.uthm.edu.my/1091/1/24p%20ANG%20SHIN%20YIN.pdf http://eprints.uthm.edu.my/1091/2/ANG%20SHIN%20YIN%20COPYRIGHT%20DECLARATION.pdf http://eprints.uthm.edu.my/1091/3/ANG%20SHIN%20YIN%20WATERMARK.pdf |
Similar Items
A heuristics approach for classroom scheduling using genetic algorithm technique
by: Ahmad, Izah R., et al.
Published: (2017)
by: Ahmad, Izah R., et al.
Published: (2017)
Designing communication network topologies using steady-state genetic algorithms
by: Sayoud, H., et al.
Published: (2001)
by: Sayoud, H., et al.
Published: (2001)
A genetic local tuning algorithm for a class of combinatorial networks design problems
by: Sayoud, H., et al.
Published: (2001)
by: Sayoud, H., et al.
Published: (2001)
Internet Security In China
by: Jia, Xu
Published: (2005)
by: Jia, Xu
Published: (2005)
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005)
by: Daw, Win Aye
Published: (2005)
Learning Environment For PDA Security
by: Velu , Vengadeshwaran
Published: (2002)
by: Velu , Vengadeshwaran
Published: (2002)
Smart security system for home (IOT)
by: Abd Oun, Muhamed Obed
Published: (2020)
by: Abd Oun, Muhamed Obed
Published: (2020)
Enhancement of network security by use machine learning
by: Hasan, Ahmed Raheem
Published: (2019)
by: Hasan, Ahmed Raheem
Published: (2019)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web Link Classification And Aceessibillity Modelling For Web Security Enhancement
by: Chong, Chee Way
Published: (1999)
by: Chong, Chee Way
Published: (1999)
Web transcript verification using check digit as secure number
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
by: Abd Halim, Muhamad Rais, et al.
Published: (2017)
Internet of things security implementation using blockchain for wireless technology
by: Karim, Karim Jabur
Published: (2019)
by: Karim, Karim Jabur
Published: (2019)
Smart home security access system using field programmable gate arrays
by: Saleh, Shukur, et al.
Published: (2018)
by: Saleh, Shukur, et al.
Published: (2018)
E-store management using bell-lapadula access control security model
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
by: Roslan, Saidah Nafisah, et al.
Published: (2018)
Algorithmic Framework For Onthology Mapping And Merging
by: Kiu, Ching Chieh
Published: (2007)
by: Kiu, Ching Chieh
Published: (2007)
JXME Security: Encryption Overhead In End-To-End J2ME-JXTA Systems
by: Mazlan, Rima
Published: (2008)
by: Mazlan, Rima
Published: (2008)
Energy-Efficient Routing Algorithms For Wireless Sensor Network
by: Goh, Hock Guan
Published: (2006)
by: Goh, Hock Guan
Published: (2006)
A QoS Aware Cluster Head Selection and Hybrid Cryptography Routing Protocol for Enhancingm Efficiency and Security of VANET
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
by: JUBAIR, MOHAMMED AHMED, et al.
Published: (2022)
Efficient Call Admission Control Algorithm For CDMA Communication Systems
by: Chan , Mun Leong
Published: (2005)
by: Chan , Mun Leong
Published: (2005)
An Efficient Call Admission Control Algorithm For CDMA Communication Systems
by: Chan, Mun Leong
Published: (2005)
by: Chan, Mun Leong
Published: (2005)
Performance evaluation for different intrusion detection system algorithms using machine learning
by: Zarir, Mustafa Nadhim
Published: (2018)
by: Zarir, Mustafa Nadhim
Published: (2018)
Comparative evaluation of various GPS-free localization algorithm for wireless sensor networks
by: Musbahi, Amal Mustafa
Published: (2015)
by: Musbahi, Amal Mustafa
Published: (2015)
Study On Practice Swarm Optimization Based Search Algorithms For Network Shortest Path Problems
by: W.muhemmed, Ammar
Published: (2007)
by: W.muhemmed, Ammar
Published: (2007)
Packet contention resolution in slotted optical packet switch using ant-colony based algorithm
by: Tan, Shing Chiang, et al.
Published: (2007)
by: Tan, Shing Chiang, et al.
Published: (2007)
Joint routing protocol and image compression algorithm for prolonging node lifetime in wireless sensor network
by: Ahmed Al-Doori, Ahmed Jamal
Published: (2018)
by: Ahmed Al-Doori, Ahmed Jamal
Published: (2018)
An improved negative selection algorithm based on the hybridization of cuckoo search and differential evolution for anomaly detection
by: Ayodele Nojeem, Lasisi
Published: (2018)
by: Ayodele Nojeem, Lasisi
Published: (2018)
Wavelet neural networks based solutions for elliptic partial differential equations with improved butterfly optimization algorithm training
by: Lee, Sen Tan, et al.
Published: (2020)
by: Lee, Sen Tan, et al.
Published: (2020)
Subband Adaptive Equalisation For Wireless Communications
by: Ng, Yin Hoe
Published: (2007)
by: Ng, Yin Hoe
Published: (2007)
On iterative low-complexity algorithm for optimal antenna selection and joint transmit power allocation under impact pilot contamination in downlink 5g massive MIMO systems
by: Mohammed Ahmed, Adeeb Ali
Published: (2020)
by: Mohammed Ahmed, Adeeb Ali
Published: (2020)
Disparities in the induced rain attenuation between beacon (narrowband) and broadband satellite links in tropical zones
by: Abubakar, Idrissa, et al.
Published: (2018)
by: Abubakar, Idrissa, et al.
Published: (2018)
Road to 5g
by: Amri, Muhammad Hariz Adrian, et al.
Published: (2021)
by: Amri, Muhammad Hariz Adrian, et al.
Published: (2021)
Integration of cellular network and wireless LAN
by: Indran, Taruna Kugan, et al.
Published: (2021)
by: Indran, Taruna Kugan, et al.
Published: (2021)
Mobile and education
by: Ahmad Zaini, Ainnur Diyanah, et al.
Published: (2021)
by: Ahmad Zaini, Ainnur Diyanah, et al.
Published: (2021)
An intrusion detection system for DDoS flooding attacks on IPv6 networks using deep learning techniques
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
by: Ahmed Marwan, Idrees Aleesa
Published: (2021)
Substrate integrated waveguide microwave antenna and filter design using H-fractal unit cell
by: Hamzah, Ayad Muslim
Published: (2021)
by: Hamzah, Ayad Muslim
Published: (2021)
Pattern reconfigurable metamaterial antenna for 5G base station network
by: Esmail, Bashar Ali Farea
Published: (2021)
by: Esmail, Bashar Ali Farea
Published: (2021)
Cloud Computing based Learning Management System (CC-LMS) implementation model in Malaysia Higher Education Institutions
by: Kassim, Rahimah
Published: (2021)
by: Kassim, Rahimah
Published: (2021)
High capacity and miniaturized flexible chipless
RFID tag using modified complementary
split ring resonator
by: Jalil, Mohd Ezwan, et al.
Published: (2021)
by: Jalil, Mohd Ezwan, et al.
Published: (2021)
Development of augmented reality application for chemical bond
by: Jamil, Norsyahrina, et al.
Published: (2021)
by: Jamil, Norsyahrina, et al.
Published: (2021)
Low loss waveguide-based Butler matrix with
iris coupling control method for millimeterwave
applications
by: W. Almeshehe, Muataz, et al.
Published: (2021)
by: W. Almeshehe, Muataz, et al.
Published: (2021)
Similar Items
-
A heuristics approach for classroom scheduling using genetic algorithm technique
by: Ahmad, Izah R., et al.
Published: (2017) -
Designing communication network topologies using steady-state genetic algorithms
by: Sayoud, H., et al.
Published: (2001) -
A genetic local tuning algorithm for a class of combinatorial networks design problems
by: Sayoud, H., et al.
Published: (2001) -
Internet Security In China
by: Jia, Xu
Published: (2005) -
Key Management For Multicast Security
by: Daw, Win Aye
Published: (2005)