Search Results - (( (evolution OR solution) controller based algorithm ) OR ( java implementation a algorithm ))

Refine Results
  1. 1

    Campus safe: Safeguarding GPS-based Physical Identity and Access Management (PIAM) system with a lightweight Geo-Encryption by Yeo Zi Zian

    Published 2022
    “…The selected lightweight geo-encryption algorithm will be implemented in the proposed system, vi which develops by using Java language. …”
    Get full text
    Get full text
    Get full text
    Academic Exercise
  2. 2
  3. 3

    A novel clustering based genetic algorithm for route optimization by Aibinu, Abiodun Musa, Salau, Habeeb Bello, Najeeb, Athaur Rahman, Nwohu, Mark Ndubuka, Akachukwu, Chichebe

    Published 2016
    “…It was also observed that the introduction of clustering based selection algorithm guaranteed the selection of cluster with the optimal solution in every generation. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Get full text
    Article
  4. 4

    Control of an inverted pendulum using MODE-based optimized LQR controller by Tijani, Ismaila B., Akmeliawati, Rini, Abdullateef, Ayodele I.

    Published 2013
    “…Hence, a Multiobjective differential evolution algorithm is proposed to design an LQR controller with optimal compromise between the conflicting control objectives. …”
    Get full text
    Get full text
    Get full text
    Proceeding Paper
  5. 5

    Automatic generation of neural game controller using single and bi-objective evolutionary optimization algorithms for RTS Game by Chang, Kee Tong

    Published 2015
    “…Therefore, the main objective of this research is to investigate the performance of single objective and bi-objectives of the hybridised EC as a RTS game controller for reinforcement issue. The proposed EC methods are Genetic Algorithm (GA), Differential Evolution (DE), Evolutionary Programming (EP), and Pareto-based Differential Evolution (PDE). …”
    Get full text
    Get full text
    Get full text
    Thesis
  6. 6

    RSA Encryption & Decryption using JAVA by Ramli, Marliyana

    Published 2006
    “…The key is the trigger mechanism to the algorithm. Until the advent of the Internet, encryption was rarely used by the public, but was largely a military tool. …”
    Get full text
    Get full text
    Final Year Project
  7. 7

    Harmonic Elimination Pulse Width Modulation Using Differential Evolution Technique For Three Phase Voltage Source Inverter by Kamisman, Norazelina

    Published 2018
    “…Differential Evolution (DE) has been gaining popularity among researchers as an effective yet simple evolutionary algorithm to solve the optimization problems. …”
    Get full text
    Get full text
    Get full text
    Get full text
    Thesis
  8. 8

    Nature-Inspired cognitive evolution to play Ms. Pac-Man by Tse, Guan Tan, Jason Teo, Patricia Anthony

    Published 2011
    “…On the other hand, an evolutionary algorithm is to simulate the biological evolutionary processes that evolve potential solutions in order to solve the problems or tasks by applying the genetic operators such as crossover, mutation and selection into the solutions. …”
    Get full text
    Get full text
    Get full text
    Article
  9. 9

    Special protection and control scheme based on generation rescheduling using differential evolution and electromagnetism-like algorithm by Hadi, Mahmaad Khalid

    Published 2016
    “…The main objective of this research is designing a Special Protection and Control Scheme (SPCS) based on a hybrid approach of combining Differential Evolution (DE) and Electromagnetism-Like algorithms. …”
    Get full text
    Get full text
    Thesis
  10. 10

    A coevolutionary multiobjective evolutionary algorithm for game artificial intelligence by Tse, Guan Tan, Jason, Teo, Kim, On Chin, Alfred, Rayner

    Published 2013
    “…Recently, the growth of Artificial Intelligence (AI) has provided a set of effective techniques for designing computer-based controllers to perform various tasks autonomously in game area, specifically to produce intelligent optimal game controllers for playing video and computer games. …”
    Get full text
    Get full text
    Get full text
    Article
  11. 11

    Differential evolution based special protection and control scheme for contingency monitoring of transmission line overloading by Hadi, Mahmood Khalid, Othman, Mohammad Lutfi, Abdul Wahab, Noor Izzri

    Published 2017
    “…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
    Get full text
    Get full text
    Conference or Workshop Item
  12. 12

    Differential Evolution Based Special Protection and Control Scheme for Contingency Monitoring of Transmission Line Overloading by Othman, Mohammad Lutfi, Hadi, Mahmood Khalid, Abdul Wahab, Noor Izzri

    Published 2017
    “…In this paper, a Special Protection and Control Scheme (SPCS) based on Differential Evolution (DE) algorithm for optimal generation rescheduling to mitigate line overloads in contingency conditions has been presented. …”
    Get full text
    Get full text
    Get full text
    Book Section
  13. 13

    Direct approach for mining association rules from structured XML data by Abazeed, Ashraf Riad

    Published 2012
    “…The thesis also provides a two different implementation of the modified FLEX algorithm using a java based parsers and XQuery implementation. …”
    Get full text
    Get full text
    Thesis
  14. 14
  15. 15

    Plagiarism Detection System for Java Programming Assignments by Using Greedy String-Tilling Algorithm by Norulazmi, Kasim

    Published 2008
    “…The prototype system, known as Java Plagiarism Detection System (JPDS) implements the Greedy-String-Tiling algorithm to detect similarities among tokens in a Java source code files. …”
    Get full text
    Get full text
    Get full text
    Thesis
  16. 16

    Design and development of the network interface, packets scheduling and interference mitigation schemes for LTE-based femtocell networks / Sinan Ghassan Abid Ali by Ali, Sinan Ghassan Abid

    Published 2016
    “…The proposed RBP scheduling algorithm outperforms the well-known scheduling algorithms in terms of a lower PLR among users in the LTE based femtocell network. …”
    Get full text
    Get full text
    Thesis
  17. 17

    Provider independent cryptographic tools by Ibrahim, Subariah, Salleh, Mazleena, Abdul Aziz, Shah Rizan

    Published 2003
    “…The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). …”
    Get full text
    Get full text
    Get full text
    Monograph
  18. 18

    A coevolutionary multiobjective evolutionary algorithm for game artificial intelligence by Tse, Guan Tan, Teo, Jason Tze Wi, Rayner Alfred, Kim, On Chin

    Published 2013
    “…Recently, the growth of Artificial Intelligence (AI) has provided a set of effective techniques for designing computer-based controllers to perform various tasks autonomously in game area, specifically to produce intelligent optimal game controllers for playing video and computer games. …”
    Get full text
    Get full text
    Get full text
    Article
  19. 19

    Coordination of PSS and PID controller for power system stability enhancement - overview by Kasilingam G., Pasupuleti J.

    Published 2023
    “…Research showed the design of controllers based on conventional methods; soft computing and population based algorithms suffer from limitations. …”
    Article
  20. 20

    Evolution of RF-signal cognition for wheeled mobile robots using pareto multi-objective optimization by Chin, Kim On, Teo, Jason Tze Wi

    Published 2009
    “…The generated controllers are evaluated on its performances based on Pareto analysis. …”
    Get full text
    Get full text
    Get full text
    Article